z-logo
open-access-imgOpen Access
Cryptographic Suites for IPsec
Author(s) -
Paul E. Hoffman
Publication year - 2005
Publication title -
rfc
Language(s) - English
Resource type - Reports
DOI - 10.17487/rfc4308
Subject(s) - ipsec , computer science , interoperability , key exchange , cryptography , computer network , key (lock) , authentication (law) , cryptographic protocol , the internet , computer security , encryption , public key cryptography , world wide web
The IPsec, Internet Key Exchange (IKE), and IKEv2 protocols rely onsecurity algorithms to provide privacy and authentication between theinitiator and responder. There are many such algorithms available, andtwo IPsec systems cannot interoperate unless they are using the samealgorithms. This document specifies optional suites of algorithms andattributes that can be used to simplify the administration of IPsecwhen used in manual keying mode, with IKEv1 or with IKEv2. [STANDARDS-TRACK]

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom