{"draft":"draft-hoffman-ike-ipsec-hash-use-06","doc_id":"RFC4894","title":"Use of Hash Algorithms in Internet Key Exchange (IKE) and IPsec","authors":["P. Hoffman"],"format":["ASCII","HTML"],"page_count":"11","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IETF - NON WORKING GROUP","abstract":"This document describes how the IKEv1 (Internet Key Exchange version\r\n1), IKEv2, and IPsec protocols use hash functions, and explains the\r\nlevel of vulnerability of these protocols to the reduced collision\r\nresistance of the MD5 and SHA-1 hash algorithms. This memo provides information for the Internet community.","pub_date":"May 2007","keywords":["md5","pkix","certificates"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4894","errata_url":null}