{"draft":"draft-iab-crypto-alg-agility-08","doc_id":"RFC7696","title":"Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms","authors":["R. Housley"],"format":["ASCII","HTML"],"page_count":"19","pub_status":"BEST CURRENT PRACTICE","status":"BEST CURRENT PRACTICE","source":"IETF - NON WORKING GROUP","abstract":"Many IETF protocols use cryptographic algorithms to provide confidentiality,\r\nintegrity, authentication, or digital signature. Communicating peers must\r\nsupport a common set of cryptographic algorithms for these mechanisms to work\r\nproperly. This memo provides guidelines to ensure that protocols have the\r\nability to migrate from one mandatory-to-implement algorithm suite to another\r\nover time.","pub_date":"November 2015","keywords":[],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":["BCP0201"],"doi":"10.17487\/RFC7696","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc7696"}