I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. I have no comment to this draft as it adds more cipher algorithm, which is the right trend within security domain. As we know, MD5 and SHA-1 was cracked with the analytical attack by Wang Xiaoyun in Shangdong University. So there must be strong algorithm to address these security holes. Best Regards, Tina TSOU http://tinatsou.weebly.com/contact.html