Browse Prior Art Database

IP Security Document Roadmap (RFC2411)

IP.com Disclosure Number: IPCOM000002987D
Original Publication Date: 1998-Nov-01
Included in the Prior Art Database: 2000-Sep-13
Document File: 8 page(s) / 21K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

R. Thayer: AUTHOR [+3]

Abstract

The goal in writing a new Encryption Algorithm or Authentication Algorithm document is to concentrate on the application of the specific algorithm within ESP and AH. General ESP and AH concepts, definitions, and issues are covered in the ESP and AH documents. The algorithms themselves are not described in these documents. This gives us the capability to add new algorithms and also specify how any given algorithm might interact with other algorithms. The intent is to achieve the goal of avoiding duplication of information and excessive numbers of documents, the so-called "draft explosion" effect.

This text was extracted from a ASCII Text document.
This is the abbreviated version, containing approximately 14% of the total text.

Network Working Group R. Thayer

Request for Comments: 2411 Sable Technology Corporation

Category: Informational N. Doraswamy

Bay Networks

R. Glenn

NIST

November 1998

IP Security

Document Roadmap

Status of this Memo

This memo provides information for the Internet community. It does

not specify an Internet standard of any kind. Distribution of this

memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (1998). All Rights Reserved.

Abstract

The IPsec protocol suite is used to provide privacy and

authentication services at the IP layer. Several documents are used

to describe this protocol suite. The interrelationship and

organization of the various documents covering the IPsec protocol are

discussed here. An explanation of what to find in which document,

and what to include in new Encryption Algorithm and Authentication

Algorithm documents are described.

Table of Contents

1. Introduction ................................................2

2. Interrelationship of IPsec Documents ........................2

3. Keying Material .............................................4

4. Recommended Content of Algorithm Documents ..................5

4.1 Encryption and Authentication Algorithms ...................5

4.2 Encryption Algorithms ......................................6

4.3 Authentication Algorithms ..................................7

5. Security Considerations .....................................8

6. Acknowledgments .............................................8

7. References ..................................................9

8. Authors' Addresses .........................................10

9. Full Copyright Statement ...................................11

1. Introduction

This document is intended to provide guidelines for the development

of collateral specifications describing the use of new encryption and

authentication algorithms with the ESP protocol, described in [ESP]

and new authentication algorithms used with the AH protocol,

described in [AH]. ESP and AH are part of the IP Security

architecture described in [Arch]. There is a requirement for a

well-known procedure that can be used to add new encryption

algorithms or authentication algorithms to ESP and AH, not only while

the initial document set is undergoing development but after the base

documents have achieved RFC status. Following the guidelines

discussed below simplifies adding new algorithms and reduces that

amount of redundant documentation.

The goal in writing a new Encryption Algorithm or Authentication

Algorithm docu...