References from draft-corcoran-cnsa-ipsec-profile

These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Reference type help

Document Title Status Type Downref
BCP 14 Key words for use in RFCs to Indicate Requirement Levels
References Referenced by
Best Current Practice normatively references
RFC 2119 Key words for use in RFCs to Indicate Requirement Levels
References Referenced by
Best Current Practice normatively references
RFC 3526 More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)
References Referenced by
Proposed Standard normatively references
RFC 4106 The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP)
References Referenced by
Proposed Standard normatively references
RFC 4303 IP Encapsulating Security Payload (ESP)
References Referenced by
Proposed Standard normatively references
RFC 4308 Cryptographic Suites for IPsec
References Referenced by
Proposed Standard informatively references
RFC 4754 IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)
References Referenced by
Proposed Standard normatively references
RFC 4868 Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
References Referenced by
Proposed Standard normatively references
RFC 5116 An Interface and Algorithms for Authenticated Encryption
References Referenced by
Proposed Standard normatively references
RFC 5280 Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
References Referenced by
Proposed Standard normatively references
RFC 5282 Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol
References Referenced by
Proposed Standard normatively references
RFC 5903 Elliptic Curve Groups modulo a Prime (ECP Groups) for IKE and IKEv2
References Referenced by
Informational normatively references
RFC 7296 Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Internet Standard normatively references
RFC 8017 PKCS #1: RSA Cryptography Specifications Version 2.2
References Referenced by
Informational normatively references
RFC 8174 Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
References Referenced by
Best Current Practice normatively references
RFC 8221 Cryptographic Algorithm Implementation Requirements and Usage Guidance for Encapsulating Security Payload (ESP) and Authentication Header (AH)
References Referenced by
Proposed Standard normatively references
RFC 8247 Algorithm Implementation Requirements and Usage Guidance for the Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Proposed Standard normatively references
RFC 8452 AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
References Referenced by
Informational informatively references
RFC 8603 Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile
References Referenced by
Informational normatively references
RFC 8784 Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security
References Referenced by
Proposed Standard normatively references
STD 79 Internet Key Exchange Protocol Version 2 (IKEv2)
References Referenced by
Internet Standard normatively references