{"draft":"draft-ietf-tcpm-tcp-ao-crypto-03","doc_id":"RFC5926","title":"Cryptographic Algorithms for the TCP Authentication Option (TCP-AO)","authors":["G. Lebovitz","E. Rescorla"],"format":["ASCII","HTML"],"page_count":"15","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"TCP Maintenance and Minor Extensions","abstract":"The TCP Authentication Option (TCP-AO) relies on security algorithms\r\nto provide authentication between two end-points. There are many\r\nsuch algorithms available, and two TCP-AO systems cannot interoperate\r\nunless they are using the same algorithms. This document specifies\r\nthe algorithms and attributes that can be used in TCP-AO's current\r\nmanual keying mechanism and provides the interface for future message\r\nauthentication codes (MACs). [STANDARDS-TRACK]","pub_date":"June 2010","keywords":["[--------]","transmission control protocol"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC5926","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc5926"}