
Discuss this RFC: Send questions or comments to the mailing listiesg@ietf.org
Other actions:View Errata | Submit Errata | Find IPR Disclosures from the IETF | View History of RFC
Many IETF protocols use cryptographic algorithms to provide confidentiality,integrity, authentication, or digital signature. Communicating peers mustsupport a common set of cryptographic algorithms for these mechanisms to workproperly. This memo provides guidelines to ensure that protocols have theability to migrate from one mandatory-to-implement algorithm suite to anotherover time.
For the definition ofStatus,seeRFC 2026.
For the definition ofStream, seeRFC 8729.