[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: How many algorithms per SA/Transform?



I think that the more creative uses of multiple algorithms should await
a future "active ipsec" architecture, where packets carry authenticated
applets that describe their crypto processing.  The applet might be the
crypto routine(s) itself (themselves).

For the IETF here and now, one algorithm at a time.  Hey, I never liked
putting the encryption and authentication algorithms into one transform
in the first place.

Hilarie