This page will soon be deactivated—explore our new, faster, mobile-friendly site, now centralized in MyWorkspace!

Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : X.508     
  ITU-T A.5 justification information for referenced document 800-56A in draft X.508
1. Clear description of the referenced document:
Name: 800-56A
Title: Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography
2. Status of approval:
Approved
3. Justification for the specific reference:
Used as a normative reference
4. Current information, if any, about IPR issues:
Some information may be available in the NIST Patents Database that can be accessed through http://patapsco.nist.gov/ts/220/sharedpatent/index.cfm
5. Other useful information describing the "Quality" of the document:
It provides information about the Elliptic Curve Diffie-Helmann methors for key establishment.
6. The degree of stability or maturity of the document:
SP 800-56A was published in 2018. Current standards status of this document can be found at http://www.csrc.nist.gov/publications/nistpubs/
7. Relationship with other existing or emerging documents:
8. Any explicit references within that referenced document should also be listed:
[ANS X9.42] American National Standard X9.42-2003 (R2013), Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography./
[ANS X9.63] American National Standard X9.63-2011 (R2017), Key Cryptography for the Financial Services Industry: Public Key Cryptography for the Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography./
[FIPS 140] Federal Information Processing Standard 140-2, Security Requirements for Cryptographic Modules, May 25, 2001./
[FIPS 140 IG]/
National Institute of Standards and Technology, Communicationes Security Establishment, Implementation Guidance for FIPS 140-2 and the Cryptographic Module Validation Program, March 27, 2018,/
[FIPS 180] Federal Information Processing Standard 180-4, Secure Hash Standard, August 2015./
[FIPS 186] Federal Information Processing Standard 186-4, Digital Signature Standard, July 2013/
[FIPS 197] Federal Information Processing Standard 197, Advanced Encryption Standard, November 2001./
[FIPS 198] Federal Information Processing Standard 198-1, The Keyed-Hash Message Authentication Code (HMAC), July 2008./
[FIPS 202] Federal Information Processing Standard 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, August 2015./
[RFC 3526] More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE), May 2003/
[RFC 4492] Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS), May 2006/
[RFC 5903] Elliptic Curve Groups Modulo a Prime (ECP Groups) for IKE and IKEv2, June 2010/
[RFC 7919] Negotiated Finite Field Diffie-Hellman Ephemeral Parameters, August 2016/
[SECG] Standards for Efficient Cryptography Group/
[SEC2] Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, September 2000/
[SP 800-38B] Special Publication 800-38B, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, May 2005, with updates dated October 2016/
[SP 800-38C] Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality, May 2004, with updates dated July 2007/
[SP 800-38F] Special Publication 800-38F, Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping, December 2012./
[SP 800-52] Special Publication 800-52 Revision 2 (DRAFT), Guidelines for the Selection, Configuration and Use of Transport Layer Security (TLS) Implementations, November 15, 2017./
[SP 800-56B] Special Publication 800-56B Revision 1, Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography, September 2014./
[SP 800-56C] Special Publication 800-56C Revision 1, Recommendation for Key Derivation Methods in Key Establishment Schemes, April 2018/
[SP 800-57] Special Publication 800-57 Part 1 Revision 4, Recommendation for Key Management, January 2016./
[SP 800-89] Special Publication (SP) 800-89, Recommendation for Obtaining Assurances for Digital Signature Applications, November 2006./
[SP 800-90] Special Publication 800-90 series:/
Special Publication 800-90A Revision 1, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, June 2015./
Special Publication 800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation, January 2018/
Special Publication 800-90C (DRAFT), Recommendation for Random Bit Generator (RBG) Constructions, April 2016./
[SP 800-108] Special Publication 800-108, Recommendation for Key Derivation Using Pseudorandom Functions, October 2009./
[SP 800-131A] Special Publication 800-131A Revision 1, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, November 2015./
[SP 800-133] Special Publication 800-133, Recommendation for Cryptogrsphic Key Generation, December 2012./
[SP 800-135] Special Publication 800-135 Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions, December 2011./
[SP 800-185] Special Publication 800-185, SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash, December 2016./
[SP 800-186] Special Publication 800-186 (DRAFT), Recommendations for Discrete Logarithm-Based Cryptography Elliptic Curve Domain Parameters, [future release].
9. Qualification of NIST:
Qualification of NIST: NIST is recognized under the provisions of ITU-T Recommendation A.5. Qualifying information is on file in TSB.
10. Other (for any supplementary information):
Note: This form is based on Recommendation ITU-T A.5