%% You should probably cite rfc8177 instead of this I-D. @techreport{ietf-rtgwg-yang-key-chain-16, number = {draft-ietf-rtgwg-yang-key-chain-16}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-rtgwg-yang-key-chain/16/}, author = {Acee Lindem and Yingzhen Qu and Derek M. Yeung and Ing-Wher (Helen) Chen and Zhaohui (Jeffrey) Zhang}, title = {{Routing Key Chain YANG Data Model}}, pagetotal = 25, year = 2017, month = mar, day = 27, abstract = {This document describes the key chain YANG data model. Key chains are commonly used for routing protocol authentication and other applications requiring symmetric keys. A key chain is a list of elements each containing a key string, send lifetime, accept lifetime, and algorithm (authentication or encryption). By properly overlapping the send and accept lifetimes of multiple key chain elements, key strings and algorithms may be gracefully updated. By representing them in a YANG data model, key distribution can be automated. In some applications, the protocols do not use the key chain element key directly, but rather a key derivation function is used to derive a short-lived key from the key chain element key (e.g., the Master Keys used in the TCP Authentication Option(TCP-AO)).}, }