Statements (57)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Request_for_Comments
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:Point-to-Point_Protocol
|
gptkbp:abstract |
This document specifies an algorithm for generating deterministic random bits using a cryptographic hash function.
|
gptkbp:application |
Secure communications.
|
gptkbp:author |
Housley, R.
|
gptkbp:category |
gptkb:currency
|
gptkbp:communication |
gptkb:RFC_8152
RFC 6979 RFC 4086 |
gptkbp:content_type |
gptkb:Specification
RFC. |
gptkbp:doi |
10.17487/ RF C5979
|
gptkbp:editor |
R. Housley.
|
gptkbp:first_published |
October 2023
|
gptkbp:format |
gptkb:poet
ASCII. |
gptkbp:function |
gptkb:SHA-256
gptkb:SHA-512 gptkb:SHA-1 |
gptkbp:has_authority_over |
IETF Consensus
|
gptkbp:historical_documentation |
Part of the IETF standards track.
|
https://www.w3.org/2000/01/rdf-schema#label |
RFC 5979
|
gptkbp:icao_code |
RFC Series
|
gptkbp:impact |
Improves security in cryptographic applications.
|
gptkbp:is_a_document_that |
Publicly accessible.
IETF. RFC 5979. |
gptkbp:is_adopted_by |
Adopted by many standards.
|
gptkbp:is_implemented_in |
Various cryptographic libraries
Widely implemented. |
gptkbp:is_reviewed_by |
gptkb:RFC_Editor
|
gptkbp:keywords |
Randomness, Cryptography, Hash Function
|
gptkbp:language |
English.
|
gptkbp:latest_version |
1.0.
|
gptkbp:notable_recipients |
Various cryptographers.
|
gptkbp:published_year |
September 2010
|
gptkbp:purpose |
To provide a method for generating random bits that are reproducible.
|
gptkbp:recommendation |
Use a secure hash function.
|
gptkbp:regulatory_compliance |
Must conform to the specified algorithm.
|
gptkbp:related_to |
gptkb:RFC_8152
RFC 4086 |
gptkbp:replaced_by |
RFC 4086
|
gptkbp:repository |
IETF Datatracker.
|
gptkbp:resolution |
30 pages.
|
gptkbp:security_features |
Deterministic generation can lead to vulnerabilities if not used properly.
|
gptkbp:series |
RFC Series.
|
gptkbp:status |
Proposed Standard
Active. |
gptkbp:streaming_platforms |
gptkb:IETF_Stream
|
gptkbp:title |
An Algorithm for Generating Deterministic Random Bits Using a Cryptographic Hash Function
|
gptkbp:updates |
RFC 6979
|
gptkbp:use_case |
Digital signatures
Encryption keys Key generation |
gptkbp:user_reviews |
IETF Review.
|
gptkbp:uses |
Used in various cryptographic protocols.
|