Name,Recommendation,Reference HMAC-SHA256,Simplest way to ensure integrity of transmissions across adjacencies when used as outer keys and integrity of TIEs when used as inner keys. Recommended for most interoperable security protection.,[SHA-2][RFC2104] HMAC-SHA512,Same as HMAC-SHA256 with stronger protection.,[SHA-2][RFC2104] SHA256-RSASSA-PKCS1-v1_5,Recommended for high security applications where private keys are protected by according nodes. Recommended as well in case not only integrity but origin validation is necessary for TIEs. Recommended when adjacencies must be protected without disclosing the secrets on both sides of the adjacency.,"[RFC8017, Section 8.2]" SHA512-RSASSA-PKCS1-v1_5,Same as SHA256-RSASSA-PKCS1-v1_5 with stronger protection.,[RFC8017]