Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : X.1205     
  ITU-T A.5 justification information for referenced document IETF RFC 2631 (1999) in draft X.1205
1. Clear description of the referenced document:
Name: IETF RFC 2631 (1999)
Title: Diffie-Hellman Key Agreement Method , IETF RFC, June 1999.
2. Status of approval:
The referred RFCs were approved by IESG (Internet Engineering Steering Group).
3. Justification for the specific reference:
Draft Rec. X.cso refers to Diffie-Hellman Key Agreement Method , IETF RFC, June 1999.
4. Current information, if any, about IPR issues:
Information on IPR issues regarding RFCs is available at: https://datatracker.ietf.org/ipr/search/. Specifically: https://datatracker.ietf.org/ipr/search/?option=rfc_search&rfc_search=2631
5. Other useful information describing the "Quality" of the document:
Proposed Standard
6. The degree of stability or maturity of the document:
Proposed Standard
7. Relationship with other existing or emerging documents:
References within the referenced RFCs are listed under item (8).
8. Any explicit references within that referenced document should also be listed:
[CMS] Housley, R., "Cryptographic Message Syntax", RFC 2630,/
June 1999./
/
[FIPS-46-1] Federal Information Processing Standards Publication/
(FIPS PUB) 46-1, Data Encryption Standard, Reaffirmed/
1988 January 22 (supersedes FIPS PUB 46, 1977 January/
15)./
/
[FIPS-81] Federal Information Processing Standards Publication/
(FIPS PUB) 81, DES Modes of Operation, 1980 December 2./
/
[FIPS-180] Federal Information Processing Standards Publication/
(FIPS PUB) 180-1, "Secure Hash Standard", 1995 April 17./
/
[FIPS-186] Federal Information Processing Standards Publication/
(FIPS PUB) 186, "Digital Signature Standard", 1994 May/
19./
/
[P1363] "Standard Specifications for Public Key Cryptography",/
IEEE P1363 working group draft, 1998, Annex D./
/
[PKIX] Housley, R., Ford, W., Polk, W. and D. Solo, "Internet/
X.509 Public Key Infrastructure Certificate and CRL/
Profile", RFC 2459, January 1999./
/
[LAW98] L. Law, A. Menezes, M. Qu, J. Solinas and S. Vanstone,/
"An efficient protocol for authenticated key agreement",/
Technical report CORR 98-05, University of Waterloo,/
1998./
/
[LL97] C.H. Lim and P.J. Lee, "A key recovery attack on discrete/
log-based schemes using a prime order subgroup", B.S./
Kaliski, Jr., editor, Advances in Cryptology - Crypto/
'97, Lecture Notes in Computer Science, vol. 1295, 1997,/
Springer-Verlag, pp. 249-263./
/
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate/
Requirement Levels", BCP 14, RFC 2119, March 1997./
/
[X942] "Agreement Of Symmetric Keys Using Diffie-Hellman and MQV/
Algorithms", ANSI draft, 1998./
9. Qualification of ISOC/IETF:
9.1-9.6     Decisions of ITU Council to admit ISOC to participate in the work of the Sector (June 1995 and June 1996).
9.7     The Internet Engineering Steering Group (IESG) is responsible for ongoing maintenance of the RFCs when the need arises. Comments on RFCs and corresponding changes are accommodated through the existing standardization process.
9.8     Each revision of a given RFC has a different RFC number, so no confusion is possible. All RFCs always remain available on-line. An index of RFCs and their status may be found in the IETF archives at http://www.rfc-editor.org/rfc.html.
10. Other (for any supplementary information):
None
Note: This form is based on Recommendation ITU-T A.5