[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: AH-MD5



The security provided to IP depends on the MD5 algorithm.  The security
of the MD5 algorithm depends on the structure of the IP datagram.  This
is a dependency loop, the sort of thing that one tries to avoid in
secure software design.


Follow-Ups: References: