True random numbers

James M. Cobb jcobb at ahcbsd1.ovnet.com
Sun Feb 18 12:28:28 PST 1996


 
 
  Friend, 
 
 
                            (1) 
 
 
  The Centre de Recherches Mathematique is hosting a year-long 
  program in combinatorics and group theory in 1996-1997.  The 
  year will be organized around a number of workshops spread 
  throughout the year. 
 
  Among the workshops: 
 
 
        WORKSHOP ON PSEUDORANDOM NUMBER GENERATION 
 
                       06 03 / 28 96 
 
 
  The CRC's at the University of Montreal. 
 
  Details: 
 
               ACTIVITIES at CRM.UMontreal.CA 
  
                          or 
 
               http://www.CRM.UMontreal.CA 

 
 
                           (2) 
 
 
  If you'd like to read RFC 1750, "Randomness Recommendations 
  for Security," but you're too busy to ftp, email 
 
                mailserv at ds.internic net 
 
 
  and in the body of the message include the command 
 
                document-by-name rfc1750 
 
 
  In due time it will arrive in 2 parts. 
 
  At the end of the 2d part: 
 
  References

   [ASYMMETRIC] - Secure Communications and Asymmetric Cryptosystems,
   edited by Gustavus J. Simmons, AAAS Selected Symposium 69, Westview
   Press, Inc.

   [BBS] - A Simple Unpredictable Pseudo-Random Number Generator, SIAM
   Journal on Computing, v. 15, n. 2, 1986, L. Blum, M. Blum, & M. Shub.

   [BRILLINGER] - Time Series: Data Analysis and Theory, Holden-Day,
   1981, David Brillinger.

   [CRC] - C.R.C. Standard Mathematical Tables, Chemical Rubber
   Publishing Company.

   [CRYPTO1] - Cryptography: A Primer, A Wiley-Interscience Publication,
   John Wiley & Sons, 1981, Alan G. Konheim.

   [CRYPTO2] - Cryptography:  A New Dimension in Computer Data Security,
   A Wiley-Interscience Publication, John Wiley & Sons, 1982, Carl H.
   Meyer & Stephen M. Matyas.

   [CRYPTO3] - Applied Cryptography: Protocols, Algorithms, and Source
   Code in C, John Wiley & Sons, 1994, Bruce Schneier.

   [DAVIS] - Cryptographic Randomness from Air Turbulence in Disk
   Drives, Advances in Cryptology - Crypto '94, Springer-Verlag Lecture
   Notes in Computer Science #839, 1984, Don Davis, Ross Ihaka, and
   Philip Fenstermacher.

   [DES] -  Data Encryption Standard, United States of America,
   Department of Commerce, National Institute of Standards and
   Technology, Federal Information Processing Standard (FIPS) 46-1.
   - Data Encryption Algorithm, American National Standards Institute,
   ANSI X3.92-1981.
 
   (See also FIPS 112, Password Usage, which includes FORTRAN code for
   performing DES.)

   [DES MODES] - DES Modes of Operation, United States of America,
   Department of Commerce, National Institute of Standards and
   Technology, Federal Information Processing Standard (FIPS) 81.
   - Data Encryption Algorithm - Modes of Operation, American National
   Standards Institute, ANSI X3.106-1983.

   [D-H] - New Directions in Cryptography, IEEE Transactions on
   Information Technology, November, 1976, Whitfield Diffie and Martin
   E. Hellman.

   [DoD] - Password Management Guideline, United States of America,
   Department of Defense, Computer Security Center, CSC-STD-002-85.
 
   (See also FIPS 112, Password Usage, which incorporates CSC-STD-002-85
   as one of its appendices.)

   [GIFFORD] - Natural Random Number, MIT/LCS/TM-371, September 1988,
   David K. Gifford

   [KNUTH] - The Art of Computer Programming, Volume 2: Seminumerical
   Algorithms, Chapter 3: Random Numbers. Addison Wesley Publishing
   Company, Second Edition 1982, Donald E. Knuth.

   [KRAWCZYK] - How to Predict Congruential Generators, Journal of
   Algorithms, V. 13, N. 4, December 1992, H. Krawczyk

   [MD2] - The MD2 Message-Digest Algorithm, RFC1319, April 1992, B.
   Kaliski
 
   [MD4] - The MD4 Message-Digest Algorithm, RFC1320, April 1992, R.
   Rivest
 
   [MD5] - The MD5 Message-Digest Algorithm, RFC1321, April 1992, R.
   Rivest

   [PEM] - RFCs 1421 through 1424:
   - RFC 1424, Privacy Enhancement for Internet Electronic Mail: Part
   IV: Key Certification and Related Services, 02/10/1993, B. Kaliski
   - RFC 1423, Privacy Enhancement for Internet Electronic Mail: Part
   III: Algorithms, Modes, and Identifiers, 02/10/1993, D. Balenson
   - RFC 1422, Privacy Enhancement for Internet Electronic Mail: Part
   II: Certificate-Based Key Management, 02/10/1993, S. Kent
   - RFC 1421, Privacy Enhancement for Internet Electronic Mail: Part I:
   Message Encryption and Authentication Procedures, 02/10/1993, J. Linn

   [SHANNON] - The Mathematical Theory of Communication, University of
   Illinois Press, 1963, Claude E. Shannon.  (originally from:  Bell
   System Technical Journal, July and October 1948)

   [SHIFT1] - Shift Register Sequences, Aegean Park Press, Revised
   Edition 1982, Solomon W. Golomb.

   [SHIFT2] - Cryptanalysis of Shift-Register Generated Stream Cypher
   Systems, Aegean Park Press, 1984, Wayne G. Barker.

   [SHS] - Secure Hash Standard, United States of American, National
   Institute of Science and Technology, Federal Information Processing
   Standard (FIPS) 180, April 1993.

   [STERN] - Secret Linear Congruential Generators are not
   Cryptograhically Secure, Proceedings of IEEE STOC, 1987, J. Stern.

   [VON NEUMANN] - Various techniques used in connection with random
   digits, von Neumann's Collected Works, Vol. 5, Pergamon Press, 1963,
   J. von Neumann.
 
 
  Of course you'd get the 2d edition of Schneier's Applied 
  Cryptography. 
 
  Something a little different at the introductory level: 
 
 
      J C G Lesurf 
       Physics and Astronomy Department 
       University of St Andrews 
       Scotland 
 
      Information and Measurement 
 
      Institute of Physics Publishing 
       US Editorial Office 
       The Public Ledger Building    Suite 1035 
       Independence Square 
       Philadelphia  PA    19106 
 
      1995 
 
      ix + 243 
 
      ISBN: 0 7503 0308 5 
 
 
 
  Cordially, 
 
  Jim 
 
 
 






More information about the cypherpunks-legacy mailing list