Document: draft-zimmermann-avt-zrtp-20 Reviewer: Pete McCann Review Date: 17 May 2010 IESG Telechat date: 20 May 2010 Summary: Ready Major issues: none Minor issues: I see that in draft-19, a change was made to stop using the term "HMAC" and instead substitute "MAC". However, in several places, the term "keyed hash" seems to be used interchangeably with the term "MAC". For example, in Section 4.3.1: Both parties calculate a set of keyed hashes (MACs) of shared secrets Is a MAC always a "keyed hash"? I can imagine a scheme like AES-GCM that provides an authentication tag without necessarily using a hash function. Anyway, this is a minor point. Nits/editorial comments: none