{"draft":"draft-ietf-ipsec-ikev2-algorithms-05","doc_id":"RFC4307","title":"Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)","authors":["J. Schiller"],"format":["ASCII","HTML"],"page_count":"6","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"IP Security Protocol","abstract":"The IPsec series of protocols makes use of various cryptographic\r\nalgorithms in order to provide security services. The Internet Key\r\nExchange (IKE (RFC 2409) and IKEv2) provide a mechanism to\r\nnegotiate which algorithms should be used in any given association.\r\nHowever, to ensure interoperability between disparate implementations, it\r\nis necessary to specify a set of mandatory-to-implement algorithms to\r\nensure that there is at least one algorithm that all implementations will have\r\navailable. This document defines the current set of algorithms that are\r\nmandatory to implement as part of IKEv2, as well as algorithms that\r\nshould be implemented because they may be promoted to mandatory at some\r\nfuture time. [STANDARDS-TRACK]","pub_date":"November 2005","keywords":["ipsec","ike","internet key exchange"],"obsoletes":[],"obsoleted_by":["RFC8247"],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4307","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc4307"}