{"draft":"draft-smyslov-ike2-gost-15","doc_id":"RFC9385","title":"Using GOST Cryptographic Algorithms in the Internet Key Exchange Protocol Version 2 (IKEv2)","authors":["V. Smyslov"],"format":["HTML","TEXT","PDF","XML"],"page_count":"148","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"INDEPENDENT","abstract":"This document defines a set of cryptographic transforms for use in\r\nthe Internet Key Exchange Protocol version 2 (IKEv2). The transforms\r\nare based on Russian cryptographic standard algorithms (called \"GOST\"\r\nalgorithms). Use of GOST ciphers in IKEv2 is defined in RFC 9227. \r\nThis document aims to define the use of GOST algorithms for the rest\r\nof the cryptographic transforms used in IKEv2. \r\n\r\nThis specification was developed to facilitate implementations that\r\nwish to support the GOST algorithms. This document does not imply\r\nIETF endorsement of the cryptographic algorithms used in this\r\ndocument.","pub_date":"May 2023","keywords":["Streebog","Kuznyechik","Magma","MGM"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC9385","errata_url":null}