Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
APPENDIX C: References<br />
[AC] Applied Cryptography, Schneier, John Wiley & Sons, 1996.<br />
[ANSX9.31] Digital Signatures using reversible Public Key Cryptography for the<br />
Financial Services Industry (rDSA), 1998.<br />
March, 2007<br />
[ANSX9.42] Public Key Cryptography for the Financial Services Industry: Agreement<br />
of Symmetric Keys Using discrete Logarithm Cryptography, 2001.<br />
[ANSX9.44] Public Key Cryptography for the Financial Services Industry: Key<br />
Agreement Using Factoring-Based Cryptography, (Insert date when<br />
published).<br />
[ANSX9.52] Triple Data Encryption Algorithm Modes of Operation, July, 1998.<br />
[ANSX9.62] Public Key Cryptography for the Financial Services Industry: The Elliptic<br />
Curve Digital Signature Algorithm (ECDSA), 1998.<br />
[ANSX9.63] Public Key Cryptography for the Financial Services Industry: Key<br />
Agreement and Key Transport Using Elliptic Curve Cryptography, [Insert<br />
Date].<br />
[ANSX9.82] Random Number Generation (Insert data when published).<br />
[DiCrescenzo] How to forget a secret, G. Di Crescenzo, N. Ferguson, R. Impagliazzo,<br />
and M Jakobsson, STACS ’99, Available via<br />
http://www.rsasecrutiy.com/rsalabs/~markus.<br />
[DOD-KRP] Key Recovery Policy for the United States Department of Defense,<br />
Version 3.0, 31 August 2003, DoD KRP, Attn: I5P, 9800 Savage Road,<br />
STE 6737, Ft Meade, MD, 20755-6737.<br />
[FIPS46-3] Federal Information Processing Standard 46-3, Data Encryption Standard<br />
(DES), October 25, 1999.<br />
[FIPS140-2] Federal Information Processing Standard 140-2, <strong>Security</strong> Requirements<br />
for Cryptographic Modules, May 25, 2001.<br />
[FIPS180-2] Federal Information Processing Standard 180-2, Secure Hash Standard<br />
(SHS), August 2002.<br />
[FIPS186-3] Federal Information Processing Standard 186-3, Digital Signature<br />
Standard (DSS), (Revision of FIPS 186-2, June 2000), to be published.<br />
[FIPS197] Federal Information Processing Standard 197, Advanced Encryption<br />
Standard (AES), November 2001.<br />
[FIPS198] Federal Information Processing Standard 198, Keyed-Hash Message<br />
Authentication Code (HMAC), [Insert Date].<br />
[FIPS199] Federal Information Processing Standard 199, Standards for <strong>Security</strong><br />
Categorization of Federal Information and Information Systems, v 1.0,<br />
May 2003.<br />
139