Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : X.511     
  ITU-T A.5 justification information for referenced document IETF RFC 2025 (1996) in draft X.511
1. Clear description of the referenced document:
Name: IETF RFC 2025 (1996)
Title: The Simple Public-Key GSS-API Mechanism (SPKM)
2. Status of approval:
October 1996 as Proposed Standard.
3. Justification for the specific reference:
Rec. ITU-T X.511 references IETF RFC 2025 for an abstraction of the module specified by IETF RFC 2025.
4. Current information, if any, about IPR issues:
Information on IPR issues regarding RFCs is available at: https://datatracker.ietf.org/ipr/search/.
5. Other useful information describing the "Quality" of the document:
Approved in October 1996 as Proposed Standard.
6. The degree of stability or maturity of the document:
There are no errata available.
7. Relationship with other existing or emerging documents:
Not know.
8. Any explicit references within that referenced document should also be listed:
[Davi89]: D. W. Davies and W. L. Price, "Security for Computer Networks", Second Edition, John Wiley and Sons, New York, 1989./
[FIPS-113]: National Bureau of Standards, Federal Information Processing Standard 113, "Computer Data Authentication", May 1985./
[GSSv2]: Linn, J., "Generic Security Service Application Program Interface Version 2", Work in Progress./
[Juen84]: R. R. Jueneman, C. H. Meyer and S. M. Matyas, Message Authentication with Manipulation Detection Codes, in Proceedings of the 1983 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1984, pp.33-54./
[KRB5]: Linn, J., "The Kerberos Version 5 GSS-API Mechanism", RFC 1964, June 1996./
[PKCS1]: RSA Encryption Standard, Version 1.5, RSA Data Security, Inc., Nov. 1993./
[PKCS3]: Diffie-Hellman Key-Agreement Standard, Version 1.4, RSA Data Security, Inc., Nov. 1993./
[RFC-1321]: Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321./
[RFC-1422]: Kent, S., "Privacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management", RFC 1422./
[RFC-1423]: Balenson, D., "Privacy Enhancement for Internet Elecronic Mail: Part III: Algorithms, Modes, and Identifiers", RFC 1423./
[RFC-1508]: Linn, J., "Generic Security Service Application Program Interface", RFC 1508./
[RFC-1509]: Wray, J., "Generic Security Service Application Program Interface: C-bindings", RFC 1509./
[RFC-1510]: Kohl J., and C. Neuman, "The Kerberos Network Authentication Service (V5)", RFC 1510./
[9798]: ISO/IEC 9798-3, "Information technology - Security Techniques - Entity authentication mechanisms - Part 3: Entitiy authentication using a public key algorithm", ISO/IEC, 1993./
[X.501]: ISO/IEC 9594-2, "Information Technology - Open Systems Interconnection - The Directory: Models", CCITT/ITU Recommendation X.501, 1993./
[X.509]: ISO/IEC 9594-8, "Information Technology - Open Systems Interconnection - The Directory: Authentication Framework", CCITT/ITU Recommendation X.509, 1993./
[X9.44]: ANSI, "Public Key Cryptography Using Reversible Algorithms for the Financial Services Industry: Transport of Symmetric Algorithm Keys Using RSA", X9.44-1993.
9. Qualification of ISOC/IETF:
9.1-9.6     Decisions of ITU Council to admit ISOC to participate in the work of the Sector (June 1995 and June 1996).
9.7     The Internet Engineering Steering Group (IESG) is responsible for ongoing maintenance of the RFCs when the need arises. Comments on RFCs and corresponding changes are accommodated through the existing standardization process.
9.8     Each revision of a given RFC has a different RFC number, so no confusion is possible. All RFCs always remain available on-line. An index of RFCs and their status may be found in the IETF archives at http://www.rfc-editor.org/rfc.html.
10. Other (for any supplementary information):
None.
Note: This form is based on Recommendation ITU-T A.5