Protocol Action: The PPP DES Encryption Protocol, Version 2 (DESE-bis) to Proposed Standard

The IESG <iesg-secretary@ietf.org> Tue, 15 September 1998 13:55 UTC

Received: (from adm@localhost) by ietf.org (8.8.5/8.8.7a) id JAA20533 for ietf-123-outbound.10@ietf.org; Tue, 15 Sep 1998 09:55:02 -0400 (EDT)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.8.5/8.8.7a) with ESMTP id JAA20406; Tue, 15 Sep 1998 09:49:23 -0400 (EDT)
Message-Id: <199809151349.JAA20406@ietf.org>
To: IETF-Announce:;
Cc: RFC Editor <rfc-editor@isi.edu>
Cc: Internet Architecture Board <iab@isi.edu>
Cc: ietf-ppp@merit.edu
From: The IESG <iesg-secretary@ietf.org>
Subject: Protocol Action: The PPP DES Encryption Protocol, Version 2 (DESE-bis) to Proposed Standard
Date: Tue, 15 Sep 1998 09:49:23 -0400
Sender: scoya@ns.cnri.reston.va.us


The IESG has approved the Internet-Draft 'The PPP DES Encryption
Protocol, Version 2 (DESE-bis)'
<draft-ietf-pppext-des-encrypt-v2-03.txt> as a Proposed Standard.  This
document is the product of the Point-to-Point Protocol Extensions
Working Group.  The IESG contact persons are Jeffrey Burgan and Thomas
Narten.
 
 
Technical Summary
 
  The PPP Encryption Control Protocol (ECP) provides a method to
  negotiate and utilize encryption protocols over PPP encapsulated
  links. This document provides specific details for the use of the DES
  standard for encrypting PPP encapsulated packets.

  The purpose of this draft is both to show how one specifies the
  necessary details of a "data" or "bearer" protocol given the context
  of the generic PPP Encryption Control Protocol, and also to provide
  at least one commonly-understood means of secure data transmission
  between PPP implementations.

  The DES encryption algorithm is a well studied, understood and widely
  implemented encryption algorithm. The DES cipher was designed for
  efficient implementation in hardware, and consequently may be
  relatively expensive to implement in software.  However, its
  pervasiveness makes it seem like a reasonable choice for a "model"
  encryption protocol.

Working Group Summary

  The Working Group last call produced no issues with this document.

Protocol Quality

  This document has been reviewed by Jeffrey Burgan and Thomas Narten
  of the IESG.