[Cfrg] I-D Action: draft-irtf-cfrg-randomness-improvements-01.txt
internet-drafts@ietf.org Mon, 02 July 2018 22:32 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: cfrg@ietf.org
Delivered-To: cfrg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id AA0371313F4; Mon, 2 Jul 2018 15:32:22 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: cfrg@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.81.3
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153057074266.16504.3005107465775487514@ietfa.amsl.com>
Date: Mon, 02 Jul 2018 15:32:22 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/Pi_op0aKBcedfgAMMPeLoClMono>
Subject: [Cfrg] I-D Action: draft-irtf-cfrg-randomness-improvements-01.txt
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.26
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Jul 2018 22:32:28 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Crypto Forum RG of the IRTF. Title : Randomness Improvements for Security Protocols Authors : Cas Cremers Luke Garratt Stanislav Smyshlyaev Nick Sullivan Christopher A. Wood Filename : draft-irtf-cfrg-randomness-improvements-01.txt Pages : 7 Date : 2018-07-02 Abstract: Randomness is a crucial ingredient for TLS and related security protocols. Weak or predictable "cryptographically-strong" pseudorandom number generators (CSPRNGs) can be abused or exploited for malicious purposes. The Dual EC random number backdoor and Debian bugs are relevant examples of this problem. This document describes a way for security protocol participants to mix their long- term private key into the entropy pool(s) from which random values are derived. This augments and improves randomness from broken or otherwise subverted CSPRNGs. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-irtf-cfrg-randomness-improvements/ There are also htmlized versions available at: https://tools.ietf.org/html/draft-irtf-cfrg-randomness-improvements-01 https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-randomness-improvements-01 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-irtf-cfrg-randomness-improvements-01 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/
- [Cfrg] I-D Action: draft-irtf-cfrg-randomness-imp… internet-drafts
- [Cfrg] randomness improvements via DHE/ECDHE, was… Jason Cooper
- Re: [Cfrg] randomness improvements via DHE/ECDHE,… Natanael