Connected: An Internet Encyclopedia
RFC 1423

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Next: 1. Message Encryption Algorithms

RFC 1423

RFC 1423 Network Working Group
Request for Comments: 1423
Obsoletes: 1115

D. Balenson
TIS
IAB IRTF PSRG, IETF PEM WG
February 1993

Privacy Enhancement for Internet Electronic Mail:
Part III: Algorithms, Modes, and Identifiers

Status of This Memo

This RFC specifies an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Abstract

This document provides definitions, formats, references, and citations for cryptographic algorithms, usage modes, and associated identifiers and parameters used in support of Privacy Enhanced Mail (PEM) in the Internet community. It is intended to become one member of the set of related PEM RFCs. This document is organized into four primary sections, dealing with message encryption algorithms, message integrity check algorithms, symmetric key management algorithms, and asymmetric key management algorithms (including both asymmetric encryption and asymmetric signature algorithms).

Some parts of this material are cited by other documents and it is anticipated that some of the material herein may be changed, added, or replaced without affecting the citing documents. Therefore, algorithm-specific material has been placed into this separate document.

Use of other algorithms and/or modes will require case-by-case study to determine applicability and constraints. The use of additional algorithms may be documented first in Prototype or Experimental RFCs. As experience is gained, these protocols may be considered for incorporation into the standard. Additional algorithms and modes approved for use in PEM in this context will be specified in successors to this document.

Acknowledgments

This specification was initially developed by the Internet Research Task Force's Privacy and Security Research Group (IRTF PSRG) and subsequently refined based on discussion in the Internet Engineering Task Force's Privacy Enhanced Mail Working Group (IETF PEM WG). John Linn contributed significantly to the predecessor of this document (RFC 1115). I would like to thank the members of the PSRG and PEM WG, as well as all participants in discussions on the "pem- dev@tis.com" mailing list, for their contributions to this document.

Table of Contents


Next: 1. Message Encryption Algorithms

Connected: An Internet Encyclopedia
RFC 1423