RFC 5979

GPTKB entity

Statements (57)
Predicate Object
gptkbp:instance_of gptkb:Request_for_Comments
gptkbp:bfsLayer 5
gptkbp:bfsParent gptkb:Point-to-Point_Protocol
gptkbp:abstract This document specifies an algorithm for generating deterministic random bits using a cryptographic hash function.
gptkbp:application Secure communications.
gptkbp:author Housley, R.
gptkbp:category gptkb:currency
gptkbp:communication gptkb:RFC_8152
RFC 6979
RFC 4086
gptkbp:content_type gptkb:Specification
RFC.
gptkbp:doi 10.17487/ RF C5979
gptkbp:editor R. Housley.
gptkbp:first_published October 2023
gptkbp:format gptkb:poet
ASCII.
gptkbp:function gptkb:SHA-256
gptkb:SHA-512
gptkb:SHA-1
gptkbp:has_authority_over IETF Consensus
gptkbp:historical_documentation Part of the IETF standards track.
https://www.w3.org/2000/01/rdf-schema#label RFC 5979
gptkbp:icao_code RFC Series
gptkbp:impact Improves security in cryptographic applications.
gptkbp:is_a_document_that Publicly accessible.
IETF.
RFC 5979.
gptkbp:is_adopted_by Adopted by many standards.
gptkbp:is_implemented_in Various cryptographic libraries
Widely implemented.
gptkbp:is_reviewed_by gptkb:RFC_Editor
gptkbp:keywords Randomness, Cryptography, Hash Function
gptkbp:language English.
gptkbp:latest_version 1.0.
gptkbp:notable_recipients Various cryptographers.
gptkbp:published_year September 2010
gptkbp:purpose To provide a method for generating random bits that are reproducible.
gptkbp:recommendation Use a secure hash function.
gptkbp:regulatory_compliance Must conform to the specified algorithm.
gptkbp:related_to gptkb:RFC_8152
RFC 4086
gptkbp:replaced_by RFC 4086
gptkbp:repository IETF Datatracker.
gptkbp:resolution 30 pages.
gptkbp:security_features Deterministic generation can lead to vulnerabilities if not used properly.
gptkbp:series RFC Series.
gptkbp:status Proposed Standard
Active.
gptkbp:streaming_platforms gptkb:IETF_Stream
gptkbp:title An Algorithm for Generating Deterministic Random Bits Using a Cryptographic Hash Function
gptkbp:updates RFC 6979
gptkbp:use_case Digital signatures
Encryption keys
Key generation
gptkbp:user_reviews IETF Review.
gptkbp:uses Used in various cryptographic protocols.