{"draft":"draft-ietf-csi-hash-threat-12","doc_id":"RFC6273","title":"The Secure Neighbor Discovery (SEND) Hash Threat Analysis","authors":["A. Kukec","S. Krishnan","S. Jiang"],"format":["ASCII","HTML"],"page_count":"7","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Cga & Send maIntenance","abstract":"This document analyzes the use of hashes in Secure Neighbor Discovery\r\n(SEND), the possible threats to these hashes and the impact of recent\r\nattacks on hash functions used by SEND. The SEND specification\r\ncurrently uses the SHA-1 hash algorithm and PKIX certificates\r\nand does not provide support for hash algorithm agility. This\r\ndocument provides an analysis of possible threats to the hash\r\nalgorithms used in SEND. This document is not an Internet \r\nStandards Track specification; it is published for informational \r\npurposes.","pub_date":"June 2011","keywords":[],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6273","errata_url":null}