ITU's 160 anniversary

Committed to connecting the world

  •  
Girls in ICT day 2025

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : X.1141     
  ITU-T A.5 justification information for referenced document IETF RFC 1750 (1994) in draft X.1141
1. Clear description of the referenced document:
Name: IETF RFC 1750 (1994)
Title: Randomness Recommendations for Security, IETF RFC, 1994.
2. Status of approval:
The referred RFCs were approved by IESG (Internet Engineering Steering Group).
3. Justification for the specific reference:
Draft Rec. X.websec-1 refers to Randomness Recommendations for Security in order to enhance security.
4. Current information, if any, about IPR issues:
Information on IPR issues regarding RFCs is available at: https://datatracker.ietf.org/ipr/search/. Specifically: https://datatracker.ietf.org/ipr/search/?option=rfc_search&rfc_search=1750
5. Other useful information describing the "Quality" of the document:
The status of all the referred RFCs, is "Proposed Standard".
6. The degree of stability or maturity of the document:
The status of all the referred RFCs, is "Proposed Standard".
7. Relationship with other existing or emerging documents:
References within the referenced RFCs are listed under item (8).
8. Any explicit references within that referenced document should also be listed:
[ASYMMETRIC] - Secure Communications and Asymmetric Cryptosystems,/
edited by Gustavus J. Simmons, AAAS Selected Symposium 69, Westview/
Press, Inc./
/
[BBS] - A Simple Unpredictable Pseudo-Random Number Generator, SIAM/
Journal on Computing, v. 15, n. 2, 1986, L. Blum, M. Blum, & M. Shub./
/
[BRILLINGER] - Time Series: Data Analysis and Theory, Holden-Day,/
1981, David Brillinger./
/
[CRC] - C.R.C. Standard Mathematical Tables, Chemical Rubber/
Publishing Company./
/
[CRYPTO1] - Cryptography: A Primer, A Wiley-Interscience Publication,/
John Wiley & Sons, 1981, Alan G. Konheim./
/
[CRYPTO2] - Cryptography: A New Dimension in Computer Data Security,/
A Wiley-Interscience Publication, John Wiley & Sons, 1982, Carl H./
Meyer & Stephen M. Matyas./
/
[CRYPTO3] - Applied Cryptography: Protocols, Algorithms, and Source/
Code in C, John Wiley & Sons, 1994, Bruce Schneier./
/
[DAVIS] - Cryptographic Randomness from Air Turbulence in Disk/
Drives, Advances in Cryptology - Crypto '94, Springer-Verlag Lecture/
Notes in Computer Science #839, 1984, Don Davis, Ross Ihaka, and/
Philip Fenstermacher./
/
[DES] - Data Encryption Standard, United States of America,/
Department of Commerce, National Institute of Standards and/
Technology, Federal Information Processing Standard (FIPS) 46-1./
- Data Encryption Algorithm, American National Standards Institute,/
ANSI X3.92-1981./
(See also FIPS 112, Password Usage, which includes FORTRAN code for/
performing DES.)/
/
[DES MODES] - DES Modes of Operation, United States of America,/
Department of Commerce, National Institute of Standards and/
Technology, Federal Information Processing Standard (FIPS) 81./
- Data Encryption Algorithm - Modes of Operation, American National/
Standards Institute, ANSI X3.106-1983./
/
[D-H] - New Directions in Cryptography, IEEE Transactions on/
Information Technology, November, 1976, Whitfield Diffie and Martin/
E. Hellman./
[DoD] - Password Management Guideline, United States of America,/
Department of Defense, Computer Security Center, CSC-STD-002-85./
(See also FIPS 112, Password Usage, which incorporates CSC-STD-002-85/
as one of its appendices.)/
/
[GIFFORD] - Natural Random Number, MIT/LCS/TM-371, September 1988,/
David K. Gifford/
/
[KNUTH] - The Art of Computer Programming, Volume 2: Seminumerical/
Algorithms, Chapter 3: Random Numbers. Addison Wesley Publishing/
Company, Second Edition 1982, Donald E. Knuth./
/
[KRAWCZYK] - How to Predict Congruential Generators, Journal of/
Algorithms, V. 13, N. 4, December 1992, H. Krawczyk/
/
[MD2] - The MD2 Message-Digest Algorithm, RFC1319, April 1992, B./
Kaliski/
[MD4] - The MD4 Message-Digest Algorithm, RFC1320, April 1992, R./
Rivest/
[MD5] - The MD5 Message-Digest Algorithm, RFC1321, April 1992, R./
Rivest/
/
[PEM] - RFCs 1421 through 1424:/
- RFC 1424, Privacy Enhancement for Internet Electronic Mail: Part/
IV: Key Certification and Related Services, 02/10/1993, B. Kaliski/
- RFC 1423, Privacy Enhancement for Internet Electronic Mail: Part/
III: Algorithms, Modes, and Identifiers, 02/10/1993, D. Balenson/
- RFC 1422, Privacy Enhancement for Internet Electronic Mail: Part/
II: Certificate-Based Key Management, 02/10/1993, S. Kent/
- RFC 1421, Privacy Enhancement for Internet Electronic Mail: Part I:/
Message Encryption and Authentication Procedures, 02/10/1993, J. Linn/
/
[SHANNON] - The Mathematical Theory of Communication, University of/
Illinois Press, 1963, Claude E. Shannon. (originally from: Bell/
System Technical Journal, July and October 1948)/
/
[SHIFT1] - Shift Register Sequences, Aegean Park Press, Revised/
Edition 1982, Solomon W. Golomb./
/
[SHIFT2] - Cryptanalysis of Shift-Register Generated Stream Cypher/
Systems, Aegean Park Press, 1984, Wayne G. Barker./
/
[SHS] - Secure Hash Standard, United States of American, National/
Institute of Science and Technology, Federal Information Processing/
Standard (FIPS) 180, April 1993./
/
[STERN] - Secret Linear Congruential Generators are not/
Cryptograhically Secure, Proceedings of IEEE STOC, 1987, J. Stern./
[VON NEUMANN] - Various techniques used in connection with random/
digits, von Neumann's Collected Works, Vol. 5, Pergamon Press, 1963,/
J. von Neumann./
/
9. Qualification of ISOC/IETF:
9.1-9.6     Decisions of ITU Council to admit ISOC to participate in the work of the Sector (June 1995 and June 1996).
9.7     The Internet Engineering Steering Group (IESG) is responsible for ongoing maintenance of the RFCs when the need arises. Comments on RFCs and corresponding changes are accommodated through the existing standardization process.
9.8     Each revision of a given RFC has a different RFC number, so no confusion is possible. All RFCs always remain available on-line. An index of RFCs and their status may be found in the IETF archives at http://www.rfc-editor.org/rfc.html.
10. Other (for any supplementary information):
None
Note: This form is based on Recommendation ITU-T A.5