{"draft":"draft-ietf-karp-design-guide-10","doc_id":"RFC6518","title":"Keying and Authentication for Routing Protocols (KARP) Design Guidelines","authors":["G. Lebovitz","M. Bhatia"],"format":["ASCII","HTML"],"page_count":"30","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Keying and Authentication for Routing Protocols","abstract":"This document is one of a series concerned with defining a\r\nroadmap of protocol specification work for the use of modern\r\ncryptographic mechanisms and algorithms for message\r\nauthentication in routing protocols. In particular, it defines\r\nthe framework for a key management protocol that may be used to\r\ncreate and manage session keys for message authentication and\r\nintegrity. This document is not an Internet Standards Track \r\nspecification; it is published for informational purposes.","pub_date":"February 2012","keywords":["MAC","hash","security","securing","secure","authorization","protection","harden","hardening","infrastructure","router","crypto","cryptography","cryptographic","roadmap","guide","guideline","message","framework","key","keys","management","protocol","KMP","key management protocol",""],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6518","errata_url":null}