Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos, July 2012
- Canonical URL:
- File formats:
- BEST CURRENT PRACTICE
- RFC 1510
- RFC 1964, RFC 4120, RFC 4121, RFC 4757
- L. Hornquist Astrand
- krb-wg (sec)
Cite this BCP: TXT
Discuss this RFC: Send questions or comments to email@example.com
The Kerberos 5 network authentication protocol, originally specified in RFC 1510, can use the Data Encryption Standard (DES) for encryption. Almost 30 years after first publishing DES, the National Institute of Standards and Technology (NIST) finally withdrew the standard in 2005, reflecting a long-established consensus that DES is insufficiently secure. By 2008, commercial hardware costing less than USD 15,000 could break DES keys in less than a day on average. DES is long past its sell-by date. Accordingly, this document updates RFC 1964, RFC 4120, RFC 4121, and RFC 4757 to deprecate the use of DES, RC4-HMAC-EXP, and other weak cryptographic algorithms in Kerberos. Because RFC 1510 (obsoleted by RFC 4120) supports only DES, this document recommends the reclassification of RFC 1510 as Historic. This memo documents an Internet Best Current Practice.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 4844.