Connected: An Internet Encyclopedia
2. Message Integrity Check Algorithms

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1423
Prev: 1.1 DES in CBC Mode (DES-CBC)
Next: 2.1 RSA-MD2 Message Digest Algorithm

2. Message Integrity Check Algorithms

2. Message Integrity Check Algorithms

This section identifies the alternative algorithms that shall be used to compute Message Integrity Check (MIC) values for PEM messages. Character string identifiers and ASN.1 object identifiers are assigned for incorporation in encapsulated "MIC-Info:" and "Key- Info:" header fields to indicate the choice of MIC algorithm employed.

A compliant PEM implementation shall be able to process all of the alternative MIC algorithms defined here on incoming messages. It is a sender option as to which alternative is employed on an outbound message.


Next: 2.1 RSA-MD2 Message Digest Algorithm

Connected: An Internet Encyclopedia
2. Message Integrity Check Algorithms