%% You should probably cite draft-ietf-tcpm-tcp-ao-crypto instead of this I-D. @techreport{lebovitz-ietf-tcpm-tcp-ao-crypto-02, number = {draft-lebovitz-ietf-tcpm-tcp-ao-crypto-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-lebovitz-ietf-tcpm-tcp-ao-crypto/02/}, author = {Gregory M. Lebovitz}, title = {{Cryptographic Algorithms, Use, \& Implementation Requirments for TCP Authentication Option}}, pagetotal = 16, year = 2009, month = jul, day = 27, abstract = {The TCP Authentication Option, TCP-AO, relies on security algorithms to provide authentication between two end-points. There are many such algorithms available, and two TCP-AO systems cannot interoperate unless they are using the same algorithm(s). This document specifies the algorithms and attributes that can be used in TCP-AO's current manual keying mechanism.}, }