SHA-2
SHA-2 (Secure Hash Algorithm 2) is a NIST-suggested replacement for
the older SHA-1 algorithm that has been shown to have some weaknesses.
SHA-2 is applicable to Authentication Header (AH) and Encapsulating
Security Payload (ESP), as well as IKEv1 and IKEv2. Supported ICV
(Integrity Check Value) sizes are 128, 192, 224, 256, 384 and 512
bits.
In IKE, SHA-2-based HMACs can be used as PRF (Pseudo-Random-Function)
that return result of 256, 384 or 512 bits. In ESP and AH transforms
and as integrity algorithm in IKE, SHA-2 based HMACs can be used.
SHA-2 based HMACs return a digest that is half the key size of the
algorithm. Therefore, usage of SHA-2 algorithms adds a little more
overhead (128, 192 or 256 bits vs. 96 bits) to packets, when compared
to SHA-1. Also, the memory usage of transforms is increased a little.
For more details on the SHA-2 algorithm, refer to the
draft-kelly-ipsec-ciph-sha2-01.txt
document ("Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 With
IPsec") available at www.ietf.org.