Use of Hash Algorithms in Internet Key Exchange (IKE) and IPsec, May 2007
- Canonical URL:
- File formats:
- P. Hoffman
- NON WORKING GROUP
Discuss this RFC: Send questions or comments to firstname.lastname@example.org
This document describes how the IKEv1 (Internet Key Exchange version 1), IKEv2, and IPsec protocols use hash functions, and explains the level of vulnerability of these protocols to the reduced collision resistance of the MD5 and SHA-1 hash algorithms. This memo provides information for the Internet community.
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 4844.