• ANSI X9.82-1 : 2006(R2013)

    Current The latest, up-to-date edition.

    RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES

    Available format(s): 

    Language(s): 

    Published date:  12-01-2013

    Publisher:  American Bankers Association

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Conformance
    3 Normative references
    4 Terms and definitions
    5 Symbols and Abbreviations
    6 General Discussion
      6.1 Overview of Document
      6.2 The Need for Random Numbers
      6.3 Examples of Cryptographic Use of Random Numbers
    7 Overview of Random Bit Generators
      7.1 Secure RBG
      7.2 Idealized Coin Flipping - The Canonical RBG
          7.2.1 Coin Flipping Preliminaries
          7.2.2 Properties of Idealized Coin Flipping
          7.2.3 Possible Problems with Actual Coin Flipping
          7.2.4 von Neumann Unbiasing
      7.3 Random Bit Generation Functional Model
          7.3.1 Entropy Source
          7.3.2 Algorithmic Processing
          7.3.3 Interfacing with the RBG
      7.4 Types of Random Bit Generators
          7.4.1 Non-deterministic Random Bit Generator (NRBG)
          7.4.2 Deterministic Random Bit Generator (DRBG)
          7.4.3 The RBG Spectrum
          7.4.4 Summary of an Approved RBG
    8 Security Properties of a Random Bit Generator
      8.1 General Discussion
      8.2 Security Strengths
      8.3 Entropy and Min-Entropy
      8.4 Backtracking Resistance and Prediction Resistance
      8.5 Indistinguishability Versus Unpredictability
      8.6 Prediction Resistance and Backtracking Resistance
          Considerations
      8.7 Desired RBG Output Properties
      8.8 Desired RBG Operational Properties
    9 Converting Random Bits to/from Random Numbers
      9.1 The Need for Conversion Routines
      9.2 Converting Random Bits into a Random Number
          9.2.1 The Simple Discard Method
          9.2.2 The Complex Discard Method
          9.2.3 The Simple Modular Method
          9.2.4 The Complex Modular Method
      9.3 Converting a Random Number into Random Bits
          9.3.1 The No Skew (Variable Length Extraction) Method
          9.3.2 The Negligible Skew (Fixed Length Extraction)
                Method
    Annex A (Informative) Security Considerations
      A.1 Attack Model
      A.2 RBG Security Analysis
      A.3 Computationally-Indistinguishable Randomness Theorems
      A.4 Min-Entropy as the Measure of Entropy
          A.4.1 Why Shannon Entropy Is Not Appropriate
          A.4.2 Why Guessing Entropy Is Not Appropriate
          A.4.3 Min-Entropy Tutorial
    Annex B (Informative) Bibliography

    Abstract - (Show below) - (Hide below)

    Defines techniques for the generation of random numbers that shall be used whenever ASC X9 Standards require the use of a random number or bitstring for cryptographic purposes.

    General Product Information - (Show below) - (Hide below)

    Committee X9
    Document Type Standard
    Publisher American Bankers Association
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    ANSI X9.98 : 2010(R2017) FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY
    I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
    ANSI X9.44 : 2007 FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY
    EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    10/30228327 DC : 0 BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    IEEE 1609.2-2013 IEEE Standard for Wireless Access in Vehicular Environments — Security Services for Applications and Management Messages
    BS ISO/IEC 18031 : 2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    ANSI X9.119-1 : 2016 RETAIL FINANCIAL SERVICES - REQUIREMENTS FOR PROTECTION OF SENSITIVE PAYMENT CARD DATA - PART 1: USING ENCRYPTION METHODS
    04/30040736 DC : DRAFT DEC 2004 ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION
    CAN/CSA-ISO/IEC 18031:13 (R2017) Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)
    BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
    CSA ISO/IEC 18031 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
    INCITS/ISO/IEC 18031 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
    ANSI X9.82-4 : 2011(R2017) RANDOM NUMBER GENERATION - PART 4: RANDOM BIT GENERATOR CONSTRUCTIONS
    ANSI X9.82-2 : 2015 RANDOM NUMBER GENERATION - PART 2: ENTROPY SOURCES
    TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective