RE: I-D Action:draft-ietf-ltans-dssc-06.txt

"Carl Wallace" <CWallace@cygnacom.com> Tue, 20 January 2009 19:22 UTC

Return-Path: <owner-ietf-ltans@mail.imc.org>
X-Original-To: ietfarch-ltans-archive-ba2WohFa@core3.amsl.com
Delivered-To: ietfarch-ltans-archive-ba2WohFa@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ADC273A6942 for <ietfarch-ltans-archive-ba2WohFa@core3.amsl.com>; Tue, 20 Jan 2009 11:22:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.324
X-Spam-Level:
X-Spam-Status: No, score=-2.324 tagged_above=-999 required=5 tests=[AWL=-0.855, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rc8YSRIYiBEQ for <ietfarch-ltans-archive-ba2WohFa@core3.amsl.com>; Tue, 20 Jan 2009 11:22:49 -0800 (PST)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8D6223A6982 for <ltans-archive-ba2WohFa@ietf.org>; Tue, 20 Jan 2009 11:22:48 -0800 (PST)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n0KJGlPC033032 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 20 Jan 2009 12:16:47 -0700 (MST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n0KJGlHm033031; Tue, 20 Jan 2009 12:16:47 -0700 (MST) (envelope-from owner-ietf-ltans@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n0KJGZjP033006 for <ietf-ltans@imc.org>; Tue, 20 Jan 2009 12:16:46 -0700 (MST) (envelope-from CWallace@cygnacom.com)
Received: (qmail 9596 invoked from network); 20 Jan 2009 19:17:12 -0000
Received: from CWallace@cygnacom.com by scygmxsecs1.cygnacom.com with EntrustECS-Server-7.4; 20 Jan 2009 19:17:12 -0000
Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 20 Jan 2009 19:17:12 -0000
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Subject: RE: I-D Action:draft-ietf-ltans-dssc-06.txt
X-MimeOLE: Produced By Microsoft Exchange V6.5
Date: Tue, 20 Jan 2009 14:16:33 -0500
Message-ID: <FAD1CF17F2A45B43ADE04E140BA83D48936D7C@scygexch1.cygnacom.com>
In-Reply-To: <20090120170001.966E43A6A00@core3.amsl.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: I-D Action:draft-ietf-ltans-dssc-06.txt
Thread-Index: Acl7IMYZJtEa1nDWRVa5rpSm/iaJbQAErCqw
References: <20090120170001.966E43A6A00@core3.amsl.com>
From: Carl Wallace <CWallace@cygnacom.com>
To: ietf-ltans@imc.org
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org> A new WG last call will commence for this draft starting today and

ending two weeks from tomorrow.

> -----Original Message-----
> From: owner-ietf-ltans@mail.imc.org 
> [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of 
> Internet-Drafts@ietf.org
> Sent: Tuesday, January 20, 2009 12:00 PM
> To: i-d-announce@ietf.org
> Cc: ietf-ltans@imc.org
> Subject: I-D Action:draft-ietf-ltans-dssc-06.txt 
> 
> A New Internet-Draft is available from the on-line 
> Internet-Drafts directories.
> This draft is a work item of the Long-Term Archive and Notary 
> Services Working Group of the IETF.
> 
> 
> 	Title           : Data Structure for the Security 
> Suitability of Cryptographic Algorithms (DSSC)
> 	Author(s)       : T. Kunz, et al.
> 	Filename        : draft-ietf-ltans-dssc-06.txt
> 	Pages           : 41
> 	Date            : 2009-01-20
> 
> Since cryptographic algorithms can become weak over the 
> years, it is necessary to evaluate their security 
> suitability.  When signing or verifying data, or when 
> encrypting or decrypting data, these evaluations must be 
> considered.  This document specifies a data structure that 
> enables an automated analysis of the security suitability of 
> a given cryptographic algorithm at a given point of time 
> which may be in the past, at the present time or in the 
> future.Conventions used in this document
> 
> The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL 
> NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and 
> "OPTIONAL" in this document are to be interpreted as 
> described in [RFC2119].
> 
> A URL for this Internet-Draft is:
> http://www.ietf.org/internet-drafts/draft-ietf-ltans-dssc-06.txt
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> Below is the data which will enable a MIME compliant mail 
> reader implementation to automatically retrieve the ASCII 
> version of the Internet-Draft.
>