{"draft":"draft-ietf-ltans-dssc-12","doc_id":"RFC5698","title":"Data Structure for the Security Suitability of Cryptographic Algorithms (DSSC)","authors":["T. Kunz","S. Okunick","U. Pordesch"],"format":["ASCII","HTML"],"page_count":"40","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Long-Term Archive and Notary Services","abstract":"Since cryptographic algorithms can become weak over the years, it is\r\nnecessary to evaluate their security suitability. When signing or\r\nverifying data, or when encrypting or decrypting data, these\r\nevaluations must be considered. This document specifies a data\r\nstructure that enables an automated analysis of the security\r\nsuitability of a given cryptographic algorithm at a given point of\r\ntime, which may be in the past, the present, or the future. \r\n[STANDARDS-TRACK]","pub_date":"November 2009","keywords":["[--------]","long term archive","security","policy","hash algorithm","public key algorithm"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC5698","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc5698"}