4835
PROPOSED STANDARD

Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH) (Obsoleted)

Authors: V. Manral
Date: April 2007
Working Group: NON WORKING GROUP
Stream: IETF
Obsoletes: RFC 4305
Obsoleted by: RFC 7321

Abstract

The IPsec series of protocols makes use of various cryptographic algorithms in order to provide security services. The Encapsulating Security Payload (ESP) and the Authentication Header (AH) provide two mechanisms for protecting data being sent over an IPsec Security Association (SA). To ensure interoperability between disparate implementations, it is necessary to specify a set of mandatory-to-implement algorithms to ensure that there is at least one algorithm that all implementations will have available. This document defines the current set of mandatory-to-implement algorithms for ESP and AH as well as specifying algorithms that should be implemented because they may be promoted to mandatory at some future time. [STANDARDS-TRACK]

RFC 4835: Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH) [RFC Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page]

Obsoleted by: 7321 PROPOSED STANDARD
Network Working Group                                          V. Manral
Request for Comments: 4835                              IP Infusion Inc.
Obsoletes: <a href="./rfc4305">4305</a>                                               April 2007
Category: Standards Track


        <span class="h1">Cryptographic Algorithm Implementation Requirements for</span>
  <span class="h1">Encapsulating Security Payload (ESP) and Authentication Header (AH)</span>

Status of This Memo

   This document specifies an Internet standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements.  Please refer to the current edition of the "Internet
   Official Protocol Standards" (STD 1) for the standardization state
   and status of this protocol.  Distribution of this memo is unlimited.

Copyright Notice

   Copyright (C) The IETF Trust (2007).

Abstract

   The IPsec series of protocols makes use of various cryptographic
   algorithms in order to provide security services.  The Encapsulating
   Security Payload (ESP) and the Authentication Header (AH) provide two
   mechanisms for protecting data being sent over an IPsec Security
   Association (SA).  To ensure interoperability between disparate
   implementations, it is necessary to specify a set of mandatory-to-
   implement algorithms to ensure that there is at least one algorithm
   that all implementations will have available.  This document defines
   the current set of mandatory-to-implement algorithms for ESP and AH
   as well as specifying algorithms that should be implemented because
   they may be promoted to mandatory at some future time.

















<span class="grey">Manral                       Standards Track                    [Page 1]</span>

<span id="page-2" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


Table of Contents

   <a href="#section-1">1</a>.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-3">3</a>
   <a href="#section-2">2</a>.  Requirements Terminology  . . . . . . . . . . . . . . . . . . . <a href="#page-3">3</a>
   <a href="#section-3">3</a>.  Algorithm Selection . . . . . . . . . . . . . . . . . . . . . . <a href="#page-4">4</a>
     <a href="#section-3.1">3.1</a>.  Encapsulating Security Payload  . . . . . . . . . . . . . . <a href="#page-4">4</a>
       <a href="#section-3.1.1">3.1.1</a>.  ESP Encryption and Authentication Algorithms  . . . . . <a href="#page-4">4</a>
       <a href="#section-3.1.2">3.1.2</a>.  ESP Combined Mode Algorithms  . . . . . . . . . . . . . <a href="#page-5">5</a>
     <a href="#section-3.2">3.2</a>.  Authentication Header . . . . . . . . . . . . . . . . . . . <a href="#page-5">5</a>
   <a href="#section-4">4</a>.  Security Considerations . . . . . . . . . . . . . . . . . . . . <a href="#page-6">6</a>
   <a href="#section-5">5</a>.  Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-6">6</a>
   <a href="#section-6">6</a>.  Changes from <a href="./rfc2402">RFC 2402</a> and <a href="./rfc2406">RFC 2406</a> to <a href="./rfc4305">RFC 4305</a>  . . . . . . . . <a href="#page-7">7</a>
   <a href="#section-7">7</a>.  Changes from <a href="./rfc4305">RFC 4305</a> . . . . . . . . . . . . . . . . . . . . . <a href="#page-7">7</a>
   <a href="#section-8">8</a>.  References  . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-8">8</a>
     <a href="#section-8.1">8.1</a>.  Normative References  . . . . . . . . . . . . . . . . . . . <a href="#page-8">8</a>
     <a href="#section-8.2">8.2</a>.  Informative References  . . . . . . . . . . . . . . . . . . <a href="#page-9">9</a>



































<span class="grey">Manral                       Standards Track                    [Page 2]</span>

<span id="page-3" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>.  Introduction</span>

   The Encapsulating Security Payload (ESP) and the Authentication
   Header (AH) provide two mechanisms for protecting data being sent
   over an IPsec Security Association (SA) [<a href="./rfc4301" title=""Security Architecture for the Internet Protocol"">RFC4301</a>], [<a href="./rfc4302" title=""IP Authentication Header"">RFC4302</a>].  To
   ensure interoperability between disparate implementations, it is
   necessary to specify a set of mandatory-to-implement algorithms to
   ensure that there is at least one algorithm that all implementations
   will have available.  This document defines the current set of
   mandatory-to-implement algorithms for ESP and AH as well as
   specifying algorithms that should be implemented because they may be
   promoted to mandatory at some future time.

   The nature of cryptography is that new algorithms surface
   continuously and existing algorithms are continuously attacked.  An
   algorithm believed to be strong today may be demonstrated to be weak
   tomorrow.  Given this, the choice of mandatory-to-implement algorithm
   should be conservative so as to minimize the likelihood of it being
   compromised quickly.  Thought should also be given to performance
   considerations as many uses of IPsec will be in environments where
   performance is a concern.

   Finally, we need to recognize that the mandatory-to-implement
   algorithm(s) may need to change over time to adapt to the changing
   world.  For this reason, the selection of mandatory-to-implement
   algorithms is not included in the main IPsec, ESP, or AH
   specifications.  It is instead placed in this document.  As the
   choice of algorithm changes, only this document should need to be
   updated.

   Ideally, the mandatory-to-implement algorithm of tomorrow should
   already be available in most implementations of IPsec by the time it
   is made mandatory.  To facilitate this, we will attempt to identify
   such algorithms (as they are known today) in this document.  There is
   no guarantee that the algorithms that we (today) believe may be
   mandatory in the future will in fact become so.  All algorithms known
   today are subject to cryptographic attack and may be broken in the
   future.

<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>.  Requirements Terminology</span>

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [<a href="./rfc2119" title=""Key words for use in RFCs to Indicate Requirement Levels"">RFC2119</a>].







<span class="grey">Manral                       Standards Track                    [Page 3]</span>

<span id="page-4" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


   We define some additional terms here:

         SHOULD+  This term means the same as SHOULD.  However, it is
                  likely that an algorithm marked as SHOULD+ will be
                  promoted at some future time to be a MUST.

         SHOULD-  This term means the same as SHOULD.  However, it is
                  likely that an algorithm marked as SHOULD- will be
                  deprecated to a MAY or worse in a future version of
                  this document.

         MUST-    This term means the same as MUST.  However, we
                  expect that at some point in the future this algorithm
                  will no longer be a MUST.


<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>.  Algorithm Selection</span>

   For IPsec implementations to interoperate, they must support one or
   more security algorithms in common.  This section specifies the
   security algorithm implementation requirements for standards-
   conformant ESP and AH implementations.  The security algorithms
   actually used for any particular ESP or AH security association are
   determined by a negotiation mechanism, such as the Internet Key
   Exchange (IKE [<a href="./rfc2409" title=""The Internet Key Exchange (IKE)"">RFC2409</a>], [<a href="./rfc4306" title=""Internet Key Exchange (IKEv2) Protocol"">RFC4306</a>]) or pre-establishment.

   Of course, additional standard and proprietary algorithms beyond
   those listed below can be implemented.

<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a>.  Encapsulating Security Payload</span>

   The implementation conformance requirements for security algorithms
   for ESP are given in the tables below.  See <a href="#section-2">Section 2</a> for definitions
   of the values in the "Requirement" column.

<span class="h4"><a class="selflink" id="section-3.1.1" href="#section-3.1.1">3.1.1</a>.  ESP Encryption and Authentication Algorithms</span>

   These tables list encryption and authentication algorithms for the
   IPsec Encapsulating Security Payload protocol.

        Requirement    Encryption Algorithm (notes)
        -----------    --------------------------
        MUST           NULL [<a href="./rfc2410" title=""The NULL Encryption Algorithm and Its Use With IPsec"">RFC2410</a>] (1)
        MUST           AES-CBC with 128-bit keys [<a href="./rfc3602" title=""The AES-CBC Cipher Algorithm and Its Use with IPsec"">RFC3602</a>]
        MUST-          TripleDES-CBC [<a href="./rfc2451" title=""The ESP CBC-Mode Cipher Algorithms"">RFC2451</a>]
        SHOULD         AES-CTR [<a href="./rfc3686" title=""Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP)"">RFC3686</a>]
        SHOULD NOT     DES-CBC [<a href="./rfc2405" title=""The ESP DES-CBC Cipher Algorithm With Explicit IV"">RFC2405</a>] (2)




<span class="grey">Manral                       Standards Track                    [Page 4]</span>

<span id="page-5" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


        Requirement    Authentication Algorithm (notes)
        -----------    -----------------------------
        MUST           HMAC-SHA1-96 [<a href="./rfc2404" title=""The Use of HMAC-SHA-1-96 within ESP and AH"">RFC2404</a>] (3)
        SHOULD+        AES-XCBC-MAC-96 [<a href="./rfc3566" title=""The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec"">RFC3566</a>]
        MAY            NULL (1)
        MAY            HMAC-MD5-96 [<a href="./rfc2403" title=""The Use of HMAC-MD5-96 within ESP and AH"">RFC2403</a>] (4)

   Notes:

      (1) Since ESP encryption is optional, support for the "NULL"
      algorithm is required to maintain consistency with the way
      services are negotiated.  Note that while authentication and
      encryption can each be "NULL", they MUST NOT both be "NULL"
      [<a href="./rfc4301" title=""Security Architecture for the Internet Protocol"">RFC4301</a>].

      (2) DES, with its small key size and publicly demonstrated and
      open-design special-purpose cracking hardware, is of questionable
      security for general use.

      (3) Weaknesses have become apparent in SHA-1 [<a href="#ref-SHA1-COLL" title=""Update on SHA-1"">SHA1-COLL</a>]; however,
      these should not affect the use of SHA1 with HMAC.

      (4) Weaknesses have become apparent in MD5 [<a href="#ref-MD5-COLL" title=""Finding MD5 Collisions - a Toy For a Notebook"">MD5-COLL</a>]; however,
      these should not affect the use of MD5 with HMAC.

<span class="h4"><a class="selflink" id="section-3.1.2" href="#section-3.1.2">3.1.2</a>.  ESP Combined Mode Algorithms</span>

   As specified in [<a href="./rfc4303" title=""IP Encapsulating Security Payload (ESP)"">RFC4303</a>], combined mode algorithms are supported
   that provide both confidentiality and authentication services.
   Support of such algorithms will require proper structuring of ESP
   implementations.  Under many circumstances, combined mode algorithms
   provide significant efficiency and throughput advantages.  Although
   there are no suggested or required combined algorithms at this time,
   AES-CCM [<a href="./rfc4309" title=""Using Advanced Encryption Standard (AES) CCM Mode with IPsec Encapsulating Security Payload (ESP)"">RFC4309</a>] and AES-GCM [<a href="./rfc4106" title=""The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP)"">RFC4106</a>] are of interest.  AES-CCM has
   been adopted as the preferred mode in IEEE 802.11 [<a href="#ref-802.11i" title=""LAN/MAN Specific Requirements Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications"">802.11i</a>], and AES-
   GCM has been adopted as the preferred mode in IEEE 802.1ae [<a href="#ref-802.1ae" title=""Media Access Control (MAC) Security"">802.1ae</a>].

<span class="h3"><a class="selflink" id="section-3.2" href="#section-3.2">3.2</a>.  Authentication Header</span>

   The implementation conformance requirements for security algorithms
   for AH are given below.  See <a href="#section-2">Section 2</a> for definitions of the values
   in the "Requirement" column.  As you would suspect, all of these
   algorithms are authentication algorithms.








<span class="grey">Manral                       Standards Track                    [Page 5]</span>

<span id="page-6" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


       Requirement    Algorithm (notes)
       -----------    ----------------
       MUST           HMAC-SHA1-96 [<a href="./rfc2404" title=""The Use of HMAC-SHA-1-96 within ESP and AH"">RFC2404</a>] (1)
       SHOULD+        AES-XCBC-MAC-96 [<a href="./rfc3566" title=""The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec"">RFC3566</a>]
       MAY            HMAC-MD5-96 [<a href="./rfc2403" title=""The Use of HMAC-MD5-96 within ESP and AH"">RFC2403</a>] (2)

   Note:

      (1) Weaknesses have become apparent in SHA-1 [<a href="#ref-SHA1-COLL" title=""Update on SHA-1"">SHA1-COLL</a>]; however,
      these should not affect the use of SHA1 with HMAC.

      (2) Weaknesses have become apparent in MD5 [<a href="#ref-MD5-COLL" title=""Finding MD5 Collisions - a Toy For a Notebook"">MD5-COLL</a>]; however,
      these should not affect the use of MD5 with HMAC.

<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>.  Security Considerations</span>

   The security of cryptography-based systems depends on both the
   strength of the cryptographic algorithms chosen and the strength of
   the keys used with those algorithms.  The security also depends on
   the engineering and administration of the protocol used by the system
   to ensure that there are no non-cryptographic ways to bypass the
   security of the overall system.

   This document concerns itself with the selection of cryptographic
   algorithms for the use of ESP and AH, specifically with the selection
   of mandatory-to-implement algorithms.  The algorithms identified in
   this document as "MUST implement" or "SHOULD implement" are not known
   to be broken at the current time, and cryptographic research so far
   leads us to believe that they will likely remain secure into the
   foreseeable future.  However, this is not necessarily forever.  We
   would therefore expect that new revisions of this document will be
   issued from time to time that reflect the current best practice in
   this area.

<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>.  Acknowledgements</span>

   Much of the wording herein was adapted from <a href="./rfc4305">RFC 4305</a>, the parent
   document of this document.  <a href="./rfc4305">RFC 4305</a> itself borrows text from
   [<a href="./rfc4307" title=""Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)"">RFC4307</a>], "Cryptographic Algorithms for Use in the Internet Key
   Exchange Version 2", by Jeffrey I. Schiller.

   Thanks to the following people for reporting or responding to reports
   of the errors in <a href="./rfc4305">RFC 4305</a>: Paul Hoffman, Stephen Kent, Paul Koning,
   and Lars Volker.  Helpful Last-Call comments were received from Russ
   Housley, Elwyn Davies, Nicolas Williams, and Alfred Hoenes.






<span class="grey">Manral                       Standards Track                    [Page 6]</span>

<span id="page-7" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>.  Changes from <a href="./rfc2402">RFC 2402</a> and <a href="./rfc2406">RFC 2406</a> to <a href="./rfc4305">RFC 4305</a></span>

   [<a id="ref-RFC2402">RFC2402</a>] and [<a href="./rfc2406" title=""IP Encapsulating Security Payload (ESP)"">RFC2406</a>] defined the IPsec Authentication Header and
   IPsec Encapsulating Security Payload.  Each specified the
   implementation requirements for cryptographic algorithms for their
   respective protocols.  They have now been replaced with [<a href="./rfc4302" title=""IP Authentication Header"">RFC4302</a>] and
   [<a href="./rfc4303" title=""IP Encapsulating Security Payload (ESP)"">RFC4303</a>], which do not specify cryptographic algorithm
   implementation requirements, and this document, which specifies such
   requirements for both [<a href="./rfc4302" title=""IP Authentication Header"">RFC4302</a>] and [<a href="./rfc4303" title=""IP Encapsulating Security Payload (ESP)"">RFC4303</a>].

   The implementation requirements are compared below:

      Old    Old             New
      Req.   RFC(s)       Requirement     Algorithm (notes)
      ----   ------       -----------     -----------------
      MUST   2406         SHOULD NOT      DES-CBC [<a href="./rfc2405" title=""The ESP DES-CBC Cipher Algorithm With Explicit IV"">RFC2405</a>] (1)
      MUST   2402 2406    MAY             HMAC-MD5-96 [<a href="./rfc2403" title=""The Use of HMAC-MD5-96 within ESP and AH"">RFC2403</a>]
      MUST   2402 2406    MUST            HMAC-SHA1-96 [<a href="./rfc2404" title=""The Use of HMAC-SHA-1-96 within ESP and AH"">RFC2404</a>]


   Note:

      (1) The IETF deprecated the use of single DES years ago and has
      not included it in any new standard for some time (see IESG note
      on the first page of [<a href="./rfc2407" title=""The Internet IP Security Domain of Interpretation for ISAKMP"">RFC2407</a>]).  [<a href="./rfc4305" title=""Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)"">RFC4305</a>] represented the first
      standards-track recognition of that deprecation by specifying that
      implementations SHOULD NOT provide single DES.  The US Government
      National Institute of Standards and Technology (NIST) has formally
      recognized the weakness of single DES by a notice published
      [<a href="#ref-DES-WDRAW" title=""Announcing Proposed Withdrawal of Federal Information Processing Standard (FIPS) for the Data Encryption Standard (DES) and Request for Comments"">DES-WDRAW</a>] proposing to withdraw it as a US Government Standard.
      Triple DES remains approved by both the IETF and NIST.

<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>.  Changes from <a href="./rfc4305">RFC 4305</a></span>

   This document obsoletes [<a href="./rfc4305" title=""Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)"">RFC4305</a>].  The document incorporates changes
   for the support for the NULL Authentication Algorithm making the
   support from a MUST to a MAY.  This change is made to make this
   document consistent with [<a href="./rfc4301" title=""Security Architecture for the Internet Protocol"">RFC4301</a>].  Text for SHA-1 collision attacks
   as well as the future use of AES-GCM and AES-CCM is added.












<span class="grey">Manral                       Standards Track                    [Page 7]</span>

<span id="page-8" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


   The changed implementation requirement resulting from the above
   changes is listed below:

      Old      Old         New
      Req.     RFC(s)      Requirement  Algorithm (notes)
      ----     ------      -----------  -----------------
      MUST     2406        MAY          NULL Authentication
      MUST     2406        MUST         NULL Encryption
      SHOULD+  4305        MUST         AES-CBC Encryption

<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>.  References</span>

<span class="h3"><a class="selflink" id="section-8.1" href="#section-8.1">8.1</a>.  Normative References</span>

   [<a id="ref-RFC2119">RFC2119</a>]    Bradner, S., "Key words for use in RFCs to Indicate
                Requirement Levels", <a href="https://www.rfc-editor.org/bcp/bcp14">BCP14</a>,  <a href="./rfc2119">RFC2119</a>, March 1997.

   [<a id="ref-RFC2403">RFC2403</a>]    Madson, C. and R. Glenn, "The Use of HMAC-MD5-96 within
                ESP and AH", <a href="./rfc2403">RFC 2403</a>, November 1998.

   [<a id="ref-RFC2404">RFC2404</a>]    Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96
                within ESP and AH", <a href="./rfc2404">RFC 2404</a>, November 1998.

   [<a id="ref-RFC2405">RFC2405</a>]    Madson, C. and N. Doraswamy, "The ESP DES-CBC Cipher
                Algorithm With Explicit IV", <a href="./rfc2405">RFC 2405</a>, November 1998.

   [<a id="ref-RFC2410">RFC2410</a>]    Glenn, R. and S. Kent, "The NULL Encryption Algorithm
                and Its Use With IPsec", <a href="./rfc2410">RFC 2410</a>, November 1998.

   [<a id="ref-RFC2451">RFC2451</a>]    Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher
                Algorithms", <a href="./rfc2451">RFC 2451</a>, November 1998.

   [<a id="ref-RFC3566">RFC3566</a>]    Frankel, S. and H. Herbert, "The AES-XCBC-MAC-96
                Algorithm and Its Use With IPsec", <a href="./rfc3566">RFC 3566</a>,
                September 2003.

   [<a id="ref-RFC3602">RFC3602</a>]    Frankel, S., Glenn, R., and S. Kelly, "The AES-CBC
                Cipher Algorithm and Its Use with IPsec", <a href="./rfc3602">RFC 3602</a>,
                September 2003.

   [<a id="ref-RFC3686">RFC3686</a>]    Housley, R., "Using Advanced Encryption Standard (AES)
                Counter Mode With IPsec Encapsulating Security Payload
                (ESP)", <a href="./rfc3686">RFC 3686</a>, January 2004.

   [<a id="ref-RFC4301">RFC4301</a>]    Kent, S. and K. Seo, "Security Architecture for the
                Internet Protocol", <a href="./rfc4301">RFC 4301</a>, December 2005.

   [<a id="ref-RFC4302">RFC4302</a>]    Kent, S., "IP Authentication Header", <a href="./rfc4302">RFC 4302</a>,



<span class="grey">Manral                       Standards Track                    [Page 8]</span>

<span id="page-9" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


                December 2005.

   [<a id="ref-RFC4303">RFC4303</a>]    Kent, S., "IP Encapsulating Security Payload (ESP)",
                <a href="./rfc4303">RFC 4303</a>, December 2005.

   [<a id="ref-RFC4305">RFC4305</a>]    Eastlake, D., "Cryptographic Algorithm Implementation
                Requirements for Encapsulating Security Payload (ESP)
                and Authentication Header (AH)", <a href="./rfc4305">RFC 4305</a>,
                December 2005.

<span class="h3"><a class="selflink" id="section-8.2" href="#section-8.2">8.2</a>.  Informative References</span>

   [<a id="ref-802.11i">802.11i</a>]    "LAN/MAN Specific Requirements Part 11: Wireless Medium
                Access Control (MAC) and physical layer (PHY)
                specifications", IEEE Standard Medium Access Control
                (MAC) Security, IEEE Std 802.11i, June 2004.

   [<a id="ref-802.1ae">802.1ae</a>]    "Media Access Control (MAC) Security", IEEE
                Standard Medium Access Control (MAC) Security, IEEE Std
                802.1ae, June 2006.

   [<a id="ref-DES-WDRAW">DES-WDRAW</a>]  "Announcing Proposed Withdrawal of Federal Information
                Processing Standard (FIPS) for the Data Encryption
                Standard (DES) and Request for Comments", FIPS
                Notice Docket No. 040602169-4169-01, July 2004.

   [<a id="ref-MD5-COLL">MD5-COLL</a>]   Klima, V., "Finding MD5 Collisions - a Toy For a
                Notebook", Cryptology ePrint Archive Medium Report 2005/
                075, March 2005.

   [<a id="ref-RFC2402">RFC2402</a>]    Kent, S. and R. Atkinson, "IP Authentication Header",
                <a href="./rfc2402">RFC 2402</a>, November 1998.

   [<a id="ref-RFC2406">RFC2406</a>]    Kent, S. and R. Atkinson, "IP Encapsulating Security
                Payload (ESP)", <a href="./rfc2406">RFC 2406</a>, November 1998.

   [<a id="ref-RFC2407">RFC2407</a>]    Piper, D., "The Internet IP Security Domain of
                Interpretation for ISAKMP", <a href="./rfc2407">RFC 2407</a>, November 1998.

   [<a id="ref-RFC2409">RFC2409</a>]    Harkins, D. and D. Carrel, "The Internet Key Exchange
                (IKE)", <a href="./rfc2409">RFC 2409</a>, November 1998.

   [<a id="ref-RFC4106">RFC4106</a>]    Viega, J. and D. McGrew, "The Use of Galois/Counter Mode
                (GCM) in IPsec Encapsulating Security Payload (ESP)",
                <a href="./rfc4106">RFC 4106</a>, June 2005.

   [<a id="ref-RFC4306">RFC4306</a>]    Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
                <a href="./rfc4306">RFC 4306</a>, December 2005.



<span class="grey">Manral                       Standards Track                    [Page 9]</span>

<span id="page-10" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


   [<a id="ref-RFC4307">RFC4307</a>]    Schiller, J., "Cryptographic Algorithms for Use in the
                Internet Key Exchange Version 2 (IKEv2)", <a href="./rfc4307">RFC 4307</a>,
                December 2005.

   [<a id="ref-RFC4309">RFC4309</a>]    Housley, R., "Using Advanced Encryption Standard (AES)
                CCM Mode with IPsec Encapsulating Security Payload
                (ESP)", <a href="./rfc4309">RFC 4309</a>, December 2005.

   [<a id="ref-SHA1-COLL">SHA1-COLL</a>]  Rijmen, V. and E. Oswald, "Update on SHA-1", Cryptology
                ePrint Archive Report 2005/010, January 2005.

Author's Address

   Vishwas Manral
   IP Infusion Inc.
   Bamankhola, Bansgali,
   Almora, Uttarakhand  263601
   India

   Phone: +91-98456-61911
   EMail: [email protected]






























<span class="grey">Manral                       Standards Track                   [Page 10]</span>

<span id="page-11" ></span>
<span class="grey"><a href="./rfc4835">RFC 4835</a>           Cryptographic Algorithms ESP and AH        April 2007</span>


Full Copyright Statement

   Copyright (C) The IETF Trust (2007).

   This document is subject to the rights, licenses and restrictions
   contained in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a>, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and <a href="https://www.rfc-editor.org/bcp/bcp79">BCP 79</a>.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   <a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   [email protected].

Acknowledgement

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).







Manral                       Standards Track                   [Page 11]

Additional Resources