While similar services are provided by other protocols (e.g., [IPSEC]),
they tend to be very complicated and difficult to analyze (see, for
example, [IPSEC-EVAL]). By contrast, TrIPE attempts to get away with
doing as little as possible. There are no negotiations to decide which
ciphers are to be used: these things are defined in the protocol
specification. There is only one key-exchange algorithm defined.
While similar services are provided by other protocols (e.g., [IPSEC]),
they tend to be very complicated and difficult to analyze (see, for
example, [IPSEC-EVAL]). By contrast, TrIPE attempts to get away with
doing as little as possible. There are no negotiations to decide which
ciphers are to be used: these things are defined in the protocol
specification. There is only one key-exchange algorithm defined.