• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ANSI X9.82-1 : 2006(R2013)

Current
Current

The latest, up-to-date edition.

RANDOM NUMBER GENERATION - PART 1: OVERVIEW AND BASIC PRINCIPLES
Published date

12-01-2013

Foreword
Introduction
1 Scope
2 Conformance
3 Normative references
4 Terms and definitions
5 Symbols and Abbreviations
6 General Discussion
  6.1 Overview of Document
  6.2 The Need for Random Numbers
  6.3 Examples of Cryptographic Use of Random Numbers
7 Overview of Random Bit Generators
  7.1 Secure RBG
  7.2 Idealized Coin Flipping - The Canonical RBG
      7.2.1 Coin Flipping Preliminaries
      7.2.2 Properties of Idealized Coin Flipping
      7.2.3 Possible Problems with Actual Coin Flipping
      7.2.4 von Neumann Unbiasing
  7.3 Random Bit Generation Functional Model
      7.3.1 Entropy Source
      7.3.2 Algorithmic Processing
      7.3.3 Interfacing with the RBG
  7.4 Types of Random Bit Generators
      7.4.1 Non-deterministic Random Bit Generator (NRBG)
      7.4.2 Deterministic Random Bit Generator (DRBG)
      7.4.3 The RBG Spectrum
      7.4.4 Summary of an Approved RBG
8 Security Properties of a Random Bit Generator
  8.1 General Discussion
  8.2 Security Strengths
  8.3 Entropy and Min-Entropy
  8.4 Backtracking Resistance and Prediction Resistance
  8.5 Indistinguishability Versus Unpredictability
  8.6 Prediction Resistance and Backtracking Resistance
      Considerations
  8.7 Desired RBG Output Properties
  8.8 Desired RBG Operational Properties
9 Converting Random Bits to/from Random Numbers
  9.1 The Need for Conversion Routines
  9.2 Converting Random Bits into a Random Number
      9.2.1 The Simple Discard Method
      9.2.2 The Complex Discard Method
      9.2.3 The Simple Modular Method
      9.2.4 The Complex Modular Method
  9.3 Converting a Random Number into Random Bits
      9.3.1 The No Skew (Variable Length Extraction) Method
      9.3.2 The Negligible Skew (Fixed Length Extraction)
            Method
Annex A (Informative) Security Considerations
  A.1 Attack Model
  A.2 RBG Security Analysis
  A.3 Computationally-Indistinguishable Randomness Theorems
  A.4 Min-Entropy as the Measure of Entropy
      A.4.1 Why Shannon Entropy Is Not Appropriate
      A.4.2 Why Guessing Entropy Is Not Appropriate
      A.4.3 Min-Entropy Tutorial
Annex B (Informative) Bibliography

Defines techniques for the generation of random numbers that shall be used whenever ASC X9 Standards require the use of a random number or bitstring for cryptographic purposes.

Committee
X9
DocumentType
Standard
PublisherName
American Bankers Association
Status
Current

ANSI X9.98 : 2010(R2017) FINANCIAL SERVICES - LATTICE-BASED POLYNOMIAL PUBLIC KEY ESTABLISHMENT ALGORITHM FOR THE FINANCIAL SERVICES INDUSTRY
I.S. EN 62734:2015 INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A
ANSI X9.44 : 2007 FINANCIAL SERVICES - PUBLIC-KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY - KEY ESTABLISHMENT USING INTEGER FACTORIZATION CRYPTOGRAPHY
EN 62734:2015 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
10/30228327 DC : 0 BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
IEEE 1609.2-2013 IEEE Standard for Wireless Access in Vehicular Environments — Security Services for Applications and Management Messages
BS ISO/IEC 18031 : 2011 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
ANSI X9.119-1 : 2016 RETAIL FINANCIAL SERVICES - REQUIREMENTS FOR PROTECTION OF SENSITIVE PAYMENT CARD DATA - PART 1: USING ENCRYPTION METHODS
04/30040736 DC : DRAFT DEC 2004 ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION
CAN/CSA-ISO/IEC 18031:13 (R2017) Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15)
BS EN 62734:2015 Industrial networks. Wireless communication network and communication profiles. ISA 100.11a
CSA ISO/IEC 18031 : 2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
IEC 62734:2014 Industrial networks - Wireless communication network and communication profiles - ISA 100.11a
INCITS/ISO/IEC 18031 : 2012 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION
ANSI X9.82-4 : 2011(R2017) RANDOM NUMBER GENERATION - PART 4: RANDOM BIT GENERATOR CONSTRUCTIONS
ANSI X9.82-2 : 2015 RANDOM NUMBER GENERATION - PART 2: ENTROPY SOURCES
TS 119 312 : 1.2.1 ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES

FIPS PUB 140 : 0001 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES

View more information
Sorry this product is not available in your region.

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.