{"draft":"draft-dukhovni-opportunistic-security-06","doc_id":"RFC7435","title":"Opportunistic Security: Some Protection Most of the Time","authors":["V. Dukhovni"],"format":["ASCII","HTML"],"page_count":"11","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IETF - NON WORKING GROUP","abstract":"This document defines the concept \"Opportunistic Security\" in the\r\ncontext of communications protocols. Protocol designs based on\r\nOpportunistic Security use encryption even when authentication is not\r\navailable, and use authentication when possible, thereby removing\r\nbarriers to the widespread use of encryption on the Internet.","pub_date":"December 2014","keywords":["authentication","encryption"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC7435","errata_url":null}