Name:
IETF RFC 5698 PDF
Published Date:
11/01/2009
Status:
[ Active ]
Publisher:
Internet Engineering Task Force
Since cryptographic algorithms can become weak over the years, it is necessary to evaluate their security suitability. When signing or verifying data, or when encrypting or decrypting data, these evaluations must be considered. This document specifies a data structure that enables an automated analysis of the security suitability of a given cryptographic algorithm at a given point of time, which may be in the past, the present, or the future.
| Edition : | 09 |
| File Size : | 1 file , 48 KB |
| Number of Pages : | 40 |
| Published : | 11/01/2009 |