VeraCrypt

Документация >> Ссылки

Ссылки

 

[1] U.S. Committee on National Security Systems (CNSS), National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information, CNSS Policy No. 15, Fact Sheet No. 1, июнь 2003, доступно здесь: http://csrc.nist.gov/groups/STM/cmvp/documents/CNSS15FS.pdf.
[2] C. E. Shannon, Communication Theory of Secrecy Systems, Bell System Technical Journal, v. 28, n. 4, 1949
[3] NIST, Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 26 ноября 2001, доступно здесь: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
[4] J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, E. Roback, NIST, Report on the Development of the Advanced Encryption Standard (AES), 2 октября 2000, Journal of Research of the National Institute of Standards and Technology, Vol. 106, No. 3, май-июнь 2001, доступно здесь: http://csrc.nist.gov/archive/aes/round2/r2report.pdf.
[5] B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, T. Kohno, M. Stay, The Twofish Team's Final Comments on AES Selection, 15 мая 2000, доступно здесь: http://csrc.nist.gov/archive/aes/round2/comments/20000515-bschneier.pdf.
[6] Bruce Schneier, Beyond Fear: Thinking Sensibly About Security in an Uncertain World, Springer, 2003
[7] RSA Laboratories, PKCS #5 v2.0: Password-Based Cryptography Standard, RSA Data Security, Inc. Public-Key Cryptography Standards (PKCS), 25 марта 1999, доступно здесь: https://www.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-5-password-based-cryptography-standard.htm.
[8] H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104, февраль 1997, доступно здесь: http://www.ietf.org/rfc/rfc2104.txt.
[9] M. Nystrom, RSA Security, Identifiers and Test Vectors for HMAC-SHA-224, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512, RFC 4231, декабрь 2005, доступно здесь: http://www.ietf.org/rfc/rfc4231.txt.
[10] Peter Gutmann, Software Generation of Practically Strong Random Numbers, представлено в 1998 на Usenix Security Symposium, доступно здесь: http://www.cs.auckland.ac.nz/~pgut001/pubs/usenix98.pdf.
[11] Carl Ellison, Cryptographic Random Numbers, изначально приложение к стандарту P1363, доступно здесь: http://world.std.com/~cme/P1363/ranno.html.
[12] P. Rogaway, Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC, Asiacrypt 2004. LNCS vol. 3329. Springer, 2004. Также доступно здесь: : http://www.cs.ucdavis.edu/~rogaway/papers/offsets.pdf.
[13] J. Kelsey, Twofish Technical Report #7: Key Separation in Twofish, AES Round 2 public comment, 7 апреля 2000
[14] NIST, Secure Hash Standard, FIPS 180-2, 1 августа 2002, доступно здесь: http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.
[15] U. Maurer, J. Massey, Cascade Ciphers: The Importance of Being First, Journal of Cryptology, v. 6, n. 1, 1993
[16] Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, 1996
[17] Peter Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory, впервые опубликовано в материалах Шестого симпозиума по безопасности, Сан-Хосе, Калифорния, 22-25 июля 1996, доступно здесь: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
[18] Веб-страница шифра Serpent: http://www.cl.cam.ac.uk/~rja14/serpent.html.
[19] M. E. Smid, AES Issues, AES Round 2 Comments, 22 мая 2000, доступно здесь: http://csrc.nist.gov/archive/aes/round2/comments/20000523-msmid-2.pdf.
[20] A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, октябрь 1996
[21] International Organization for Standardization (ISO), Information technology – Security techniques – Hash-functions – Part 3: Dedicated hash-functions, ISO/IEC 10118-3:2004, 24 февраля 2004
[22] NIST, The Keyed-Hash Message Authentication Code (HMAC), Federal Information Processing Standards Publication 198, 6 марта 2002, доступно здесь: http://csrc.nist.gov/publications/fips/fips198/fips-198a.pdf.
[23] RSA Laboratories, PKCS #11 v2.20: Cryptographic Token Interface Standard, RSA Security, Inc. Public-Key Cryptography Standards (PKCS), 28 июня 2004, доступно здесь: https://www.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-11-cryptographic-token-interface-standard.htm. PDF доступно здесь: https://www.cryptsoft.com/pkcs11doc/STANDARD/pkcs-11v2-20.pdf
[24]

Morris Dworkin, Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices, NIST Special Publication 800-3E, январь 2010, доступно здесь: http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf.

[25]

NIST, Approved Security Functions for FIPS PUB 140-2, Security Requirements for Cryptographic Modules, 8 октября 2010, доступно здесь: http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf