RE: I-D Action:draft-ietf-ltans-dssc-06.txt
"Carl Wallace" <CWallace@cygnacom.com> Tue, 20 January 2009 19:22 UTC
Return-Path: <owner-ietf-ltans@mail.imc.org>
X-Original-To: ietfarch-ltans-archive-ba2WohFa@core3.amsl.com
Delivered-To: ietfarch-ltans-archive-ba2WohFa@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id ADC273A6942 for <ietfarch-ltans-archive-ba2WohFa@core3.amsl.com>; Tue, 20 Jan 2009 11:22:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.324
X-Spam-Level:
X-Spam-Status: No, score=-2.324 tagged_above=-999 required=5 tests=[AWL=-0.855, BAYES_00=-2.599, DNS_FROM_OPENWHOIS=1.13]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rc8YSRIYiBEQ for <ietfarch-ltans-archive-ba2WohFa@core3.amsl.com>; Tue, 20 Jan 2009 11:22:49 -0800 (PST)
Received: from balder-227.proper.com (properopus-pt.tunnel.tserv3.fmt2.ipv6.he.net [IPv6:2001:470:1f04:392::2]) by core3.amsl.com (Postfix) with ESMTP id 8D6223A6982 for <ltans-archive-ba2WohFa@ietf.org>; Tue, 20 Jan 2009 11:22:48 -0800 (PST)
Received: from balder-227.proper.com (localhost [127.0.0.1]) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id n0KJGlPC033032 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 20 Jan 2009 12:16:47 -0700 (MST) (envelope-from owner-ietf-ltans@mail.imc.org)
Received: (from majordom@localhost) by balder-227.proper.com (8.14.2/8.13.5/Submit) id n0KJGlHm033031; Tue, 20 Jan 2009 12:16:47 -0700 (MST) (envelope-from owner-ietf-ltans@mail.imc.org)
X-Authentication-Warning: balder-227.proper.com: majordom set sender to owner-ietf-ltans@mail.imc.org using -f
Received: from scygmxsecs1.cygnacom.com (scygmxsecs1.cygnacom.com [65.242.48.253]) by balder-227.proper.com (8.14.2/8.14.2) with SMTP id n0KJGZjP033006 for <ietf-ltans@imc.org>; Tue, 20 Jan 2009 12:16:46 -0700 (MST) (envelope-from CWallace@cygnacom.com)
Received: (qmail 9596 invoked from network); 20 Jan 2009 19:17:12 -0000
Received: from CWallace@cygnacom.com by scygmxsecs1.cygnacom.com with EntrustECS-Server-7.4; 20 Jan 2009 19:17:12 -0000
Received: from unknown (HELO scygexch1.cygnacom.com) (10.60.50.8) by scygmxsecs1.cygnacom.com with SMTP; 20 Jan 2009 19:17:12 -0000
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Subject: RE: I-D Action:draft-ietf-ltans-dssc-06.txt
X-MimeOLE: Produced By Microsoft Exchange V6.5
Date: Tue, 20 Jan 2009 14:16:33 -0500
Message-ID: <FAD1CF17F2A45B43ADE04E140BA83D48936D7C@scygexch1.cygnacom.com>
In-Reply-To: <20090120170001.966E43A6A00@core3.amsl.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: I-D Action:draft-ietf-ltans-dssc-06.txt
Thread-Index: Acl7IMYZJtEa1nDWRVa5rpSm/iaJbQAErCqw
References: <20090120170001.966E43A6A00@core3.amsl.com>
From: Carl Wallace <CWallace@cygnacom.com>
To: ietf-ltans@imc.org
Sender: owner-ietf-ltans@mail.imc.org
Precedence: bulk
List-Archive: <http://www.imc.org/ietf-ltans/mail-archive/>
List-Unsubscribe: <mailto:ietf-ltans-request@imc.org?body=unsubscribe>
List-ID: <ietf-ltans.imc.org> A new WG last call will commence for this draft starting today and
ending two weeks from tomorrow. > -----Original Message----- > From: owner-ietf-ltans@mail.imc.org > [mailto:owner-ietf-ltans@mail.imc.org] On Behalf Of > Internet-Drafts@ietf.org > Sent: Tuesday, January 20, 2009 12:00 PM > To: i-d-announce@ietf.org > Cc: ietf-ltans@imc.org > Subject: I-D Action:draft-ietf-ltans-dssc-06.txt > > A New Internet-Draft is available from the on-line > Internet-Drafts directories. > This draft is a work item of the Long-Term Archive and Notary > Services Working Group of the IETF. > > > Title : Data Structure for the Security > Suitability of Cryptographic Algorithms (DSSC) > Author(s) : T. Kunz, et al. > Filename : draft-ietf-ltans-dssc-06.txt > Pages : 41 > Date : 2009-01-20 > > Since cryptographic algorithms can become weak over the > years, it is necessary to evaluate their security > suitability. When signing or verifying data, or when > encrypting or decrypting data, these evaluations must be > considered. This document specifies a data structure that > enables an automated analysis of the security suitability of > a given cryptographic algorithm at a given point of time > which may be in the past, at the present time or in the > future.Conventions used in this document > > The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL > NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and > "OPTIONAL" in this document are to be interpreted as > described in [RFC2119]. > > A URL for this Internet-Draft is: > http://www.ietf.org/internet-drafts/draft-ietf-ltans-dssc-06.txt > > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ > > Below is the data which will enable a MIME compliant mail > reader implementation to automatically retrieve the ASCII > version of the Internet-Draft. >
- I-D Action:draft-ietf-ltans-dssc-06.txt Internet-Drafts
- RE: I-D Action:draft-ietf-ltans-dssc-06.txt Carl Wallace
- Re: I-D Action:draft-ietf-ltans-dssc-06.txt TSG