From: “James M. Cobb” <jcobb@ahcbsd1.ovnet.com>
To: cypherpunks@toad.com
Message Hash: 3ef9634b2d63a58df8e815485c255eaa71ded16182f1419d2b5f5ae0cb064712
Message ID: <Pine.BSD.3.91.960218131947.11216A-100000@ahcbsd1.ovnet.com>
Reply To: N/A
UTC Datetime: 1996-02-18 20:28:28 UTC
Raw Date: Mon, 19 Feb 1996 04:28:28 +0800
From: "James M. Cobb" <jcobb@ahcbsd1.ovnet.com>
Date: Mon, 19 Feb 1996 04:28:28 +0800
To: cypherpunks@toad.com
Subject: Re: True random numbers
Message-ID: <Pine.BSD.3.91.960218131947.11216A-100000@ahcbsd1.ovnet.com>
MIME-Version: 1.0
Content-Type: text/plain
Friend,
(1)
The Centre de Recherches Mathematique is hosting a year-long
program in combinatorics and group theory in 1996-1997. The
year will be organized around a number of workshops spread
throughout the year.
Among the workshops:
WORKSHOP ON PSEUDORANDOM NUMBER GENERATION
06 03 / 28 96
The CRC's at the University of Montreal.
Details:
ACTIVITIES@CRM.UMontreal.CA
or
http://www.CRM.UMontreal.CA
(2)
If you'd like to read RFC 1750, "Randomness Recommendations
for Security," but you're too busy to ftp, email
mailserv@ds.internic net
and in the body of the message include the command
document-by-name rfc1750
In due time it will arrive in 2 parts.
At the end of the 2d part:
References
[ASYMMETRIC] - Secure Communications and Asymmetric Cryptosystems,
edited by Gustavus J. Simmons, AAAS Selected Symposium 69, Westview
Press, Inc.
[BBS] - A Simple Unpredictable Pseudo-Random Number Generator, SIAM
Journal on Computing, v. 15, n. 2, 1986, L. Blum, M. Blum, & M. Shub.
[BRILLINGER] - Time Series: Data Analysis and Theory, Holden-Day,
1981, David Brillinger.
[CRC] - C.R.C. Standard Mathematical Tables, Chemical Rubber
Publishing Company.
[CRYPTO1] - Cryptography: A Primer, A Wiley-Interscience Publication,
John Wiley & Sons, 1981, Alan G. Konheim.
[CRYPTO2] - Cryptography: A New Dimension in Computer Data Security,
A Wiley-Interscience Publication, John Wiley & Sons, 1982, Carl H.
Meyer & Stephen M. Matyas.
[CRYPTO3] - Applied Cryptography: Protocols, Algorithms, and Source
Code in C, John Wiley & Sons, 1994, Bruce Schneier.
[DAVIS] - Cryptographic Randomness from Air Turbulence in Disk
Drives, Advances in Cryptology - Crypto '94, Springer-Verlag Lecture
Notes in Computer Science #839, 1984, Don Davis, Ross Ihaka, and
Philip Fenstermacher.
[DES] - Data Encryption Standard, United States of America,
Department of Commerce, National Institute of Standards and
Technology, Federal Information Processing Standard (FIPS) 46-1.
- Data Encryption Algorithm, American National Standards Institute,
ANSI X3.92-1981.
(See also FIPS 112, Password Usage, which includes FORTRAN code for
performing DES.)
[DES MODES] - DES Modes of Operation, United States of America,
Department of Commerce, National Institute of Standards and
Technology, Federal Information Processing Standard (FIPS) 81.
- Data Encryption Algorithm - Modes of Operation, American National
Standards Institute, ANSI X3.106-1983.
[D-H] - New Directions in Cryptography, IEEE Transactions on
Information Technology, November, 1976, Whitfield Diffie and Martin
E. Hellman.
[DoD] - Password Management Guideline, United States of America,
Department of Defense, Computer Security Center, CSC-STD-002-85.
(See also FIPS 112, Password Usage, which incorporates CSC-STD-002-85
as one of its appendices.)
[GIFFORD] - Natural Random Number, MIT/LCS/TM-371, September 1988,
David K. Gifford
[KNUTH] - The Art of Computer Programming, Volume 2: Seminumerical
Algorithms, Chapter 3: Random Numbers. Addison Wesley Publishing
Company, Second Edition 1982, Donald E. Knuth.
[KRAWCZYK] - How to Predict Congruential Generators, Journal of
Algorithms, V. 13, N. 4, December 1992, H. Krawczyk
[MD2] - The MD2 Message-Digest Algorithm, RFC1319, April 1992, B.
Kaliski
[MD4] - The MD4 Message-Digest Algorithm, RFC1320, April 1992, R.
Rivest
[MD5] - The MD5 Message-Digest Algorithm, RFC1321, April 1992, R.
Rivest
[PEM] - RFCs 1421 through 1424:
- RFC 1424, Privacy Enhancement for Internet Electronic Mail: Part
IV: Key Certification and Related Services, 02/10/1993, B. Kaliski
- RFC 1423, Privacy Enhancement for Internet Electronic Mail: Part
III: Algorithms, Modes, and Identifiers, 02/10/1993, D. Balenson
- RFC 1422, Privacy Enhancement for Internet Electronic Mail: Part
II: Certificate-Based Key Management, 02/10/1993, S. Kent
- RFC 1421, Privacy Enhancement for Internet Electronic Mail: Part I:
Message Encryption and Authentication Procedures, 02/10/1993, J. Linn
[SHANNON] - The Mathematical Theory of Communication, University of
Illinois Press, 1963, Claude E. Shannon. (originally from: Bell
System Technical Journal, July and October 1948)
[SHIFT1] - Shift Register Sequences, Aegean Park Press, Revised
Edition 1982, Solomon W. Golomb.
[SHIFT2] - Cryptanalysis of Shift-Register Generated Stream Cypher
Systems, Aegean Park Press, 1984, Wayne G. Barker.
[SHS] - Secure Hash Standard, United States of American, National
Institute of Science and Technology, Federal Information Processing
Standard (FIPS) 180, April 1993.
[STERN] - Secret Linear Congruential Generators are not
Cryptograhically Secure, Proceedings of IEEE STOC, 1987, J. Stern.
[VON NEUMANN] - Various techniques used in connection with random
digits, von Neumann's Collected Works, Vol. 5, Pergamon Press, 1963,
J. von Neumann.
Of course you'd get the 2d edition of Schneier's Applied
Cryptography.
Something a little different at the introductory level:
J C G Lesurf
Physics and Astronomy Department
University of St Andrews
Scotland
Information and Measurement
Institute of Physics Publishing
US Editorial Office
The Public Ledger Building Suite 1035
Independence Square
Philadelphia PA 19106
1995
ix + 243
ISBN: 0 7503 0308 5
Cordially,
Jim
Return to February 1996
Return to “maruishi@netcom.com”