Announcing Draft Federal Information Processing Standard (FIPS) Publication 180-3, the Secure Hash Standard, and Request for Comments, 32282 [E7-11326]
Download as PDF
32282
Federal Register / Vol. 72, No. 112 / Tuesday, June 12, 2007 / Notices
Gaithersburg, MD 20899–8930,
telephone: 301–975–2911 or via fax at
301–975–8670, e-mail:
elaine.barker@nist.gov. or Quynh Dang,
telephone: 301–975–3610, e-mail:
quynh.dang@nist.gov.
The
changes between FIPS 198 and FIPS
198–1 are minor and are motivated by
a desire to put informative information
that may change in a separate, less
formal publication that can be readily
updated as necessary. FIPS 198
contained statements about the security
provided by the HMAC algorithm and
specified a truncation technique for the
HMAC output. Since the security
provided by the HMAC algorithm and
its applications might be altered by
future cryptanalysis, the security
statements were not included in FIPS
198–1. The security of HMAC will be
addressed in NIST Special Publications
(SP) 800–57, Recommendation for Key
Management, and 800–107,
Recommendation for Using Approved
Hash Algorithms. Draft FIPS 198–1 also
does not include the truncation
technique; the truncation technique of
HMAC will be specified in the NIST
Special Publication 800–107. Draft NIST
Special Publications and NIST Special
Publications are available at https://
csrc.nist.gov/publications/.
Examples of the implementation of the
HMAC algorithm can be found at
https://www.nist.gov/
CryptoToolkitExamples. NIST will
continue to review these examples and
to update them as needed.
SUPPLEMENTARY INFORMATION:
Authority: NIST activities to develop
computer security standards to protect
Federal sensitive (unclassified) systems are
undertaken pursuant to specific
responsibilities assigned to NIST to section
20 of the National Institute of Standards and
Technology Act (15 U.S.C. 278g–3) as
amended by section 303 of the Federal
Information Security Management Act of
2002 (Pub. L. 107–347). This notice has been
determined not to be significant for the
purposes of Executive Order 12866.
Dated: June 5, 2007.
James M. Turner,
Deputy Director, NIST.
[FR Doc. E7–11309 Filed 6–11–07; 8:45 am]
cprice-sewell on PROD1PC67 with NOTICES
BILLING CODE 3510–13–P
VerDate Aug<31>2005
11:38 Jun 11, 2007
Jkt 211001
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket No.: 070413090–7092–01]
Announcing Draft Federal Information
Processing Standard (FIPS)
Publication 180–3, the Secure Hash
Standard, and Request for Comments
National Institute of Standards
and Technology, Commerce.
ACTION: Notice and request for
comments.
AGENCY:
SUMMARY: This notice announces the
Draft Federal Information Processing
Standard (FIPS) 180–3, Secure Hash
Standard (SHS), for public review and
comment. The draft standard,
designated ‘‘Draft FIPS 180–3,’’ is
proposed to supersede FIPS 180–2. FIPS
180–2, Secure Hash Standard (SHS),
August 2002, specifies secure hash
algorithms (SHA) called SHA–1, SHA–
256, SHA–384 and SHA–512. These
algorithms produce 160, 256, 384, and
512-bit outputs, respectively, which are
called message digests. An additional
secure hash algorithm, called SHA–224,
that produces a 224-bit output, is
specified in Change Notice 1 to FIPS
180–2, which was issued in 2004. Draft
FIPS 180–3 specifies five secure hash
algorithms: SHA–1, SHA–224, SHA–
256, SHA–384, and SHA–512. The
proposed standard is available at
https://csrc.nist.gov/publications/
drafts.html.
Prior to the submission of this
proposed standard to the Secretary of
Commerce for review and approval, it is
essential that consideration be given to
the needs and views of the public, users,
the information technology industry,
and Federal, State, and local
government organizations. The purpose
of this notice is to solicit such views.
DATES: Comments must be received by
September 10, 2007.
ADDRESSES: Written comments may be
sent to: Chief, Computer Security
Division, Information Technology
Laboratory, Attention: Comments on
Draft FIPS 180–3, 100 Bureau Drive—
Stop 8930, National Institute of
Standards and Technology,
Gaithersburg, MD 20899–8930.
Electronic comments may be sent to:
Proposed180–3@nist.gov. The current
FIPS 180–2 and its proposed
replacement, Draft FIPS 180–3, are
available electronically at https://
csrc.nist.gov/publications/.
Comments received in response to
this notice will be published
electronically at https://csrc.nist.gov/
CryptoToolkit/tkhash.html.
PO 00000
Frm 00007
Fmt 4703
Sfmt 4703
For
general information, contact: Elaine
Barker, National Institute of Standards
and Technology, Stop 8930,
Gaithersburg, MD 20899–8930,
telephone: 301–975–2911, e-mail:
elaine.barker@nist.gov. or via fax at
301–975–8670, or Quynh Dang,
telephone: 301–975–3610, e-mail:
quynh.dang@nist.gov.
FOR FURTHER INFORMATION CONTACT:
The
changes between FIPS 180–2 and FIPS
180–3 are minor and are motivated by
a desire to put informative information
that is subject to change in a less formal
publication that can be readily updated
as necessary. FIPS 180–2 contained
statements about the security strengths
of the hash algorithms. However, the
security strengths of the hashing
algorithms, SHA–1, SHA–224, SHA–
256, SHA–384 and SHA–512, might
change due to future cryptanalysis;
consequently, Draft FIPS 180–3 does not
describe their security strengths.
Instead, the security strengths will be
specified in NIST Special Publications
(SP) 800–57, Recommendation for Key
Management, and discussed in NIST SP
800–107, Recommendation for Using
Approved Hash Algorithms. These
Special Publications will be periodically
reviewed and updated if warranted by
advances in the cryptanalysis of these
hash algorithms. Examples of the
implementation of these hash
algorithms can be found at https://
www.nist.gov/CryptoToolkitExamples.
NIST Special Publications are available
at: https://csrc.nist.gov/publications/
index.html.
SUPPLEMENTARY INFORMATION:
Authority: NIST activities to develop
computer security standards to protect
Federal sensitive (unclassified) systems are
undertaken pursuant to specific
responsibilities assigned to NIST by section
20 of the National Institute of Standards and
Technology Act (5 U.S.C. 278g–3) as
amended by section 303 of the Federal
Information Security Management Act of
2002 (Pub. L. 107–347). Executive Order
12866: This notice has been determined not
to be significant for the purpose of Executive
Order 12866.
Dated: June 5, 2007.
James M. Turner,
Deputy Director, NIST.
[FR Doc. E7–11326 Filed 6–11–07; 8:45 am]
BILLING CODE 3510–13–P
E:\FR\FM\12JNN1.SGM
12JNN1
Agencies
[Federal Register Volume 72, Number 112 (Tuesday, June 12, 2007)]
[Notices]
[Page 32282]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E7-11326]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No.: 070413090-7092-01]
Announcing Draft Federal Information Processing Standard (FIPS)
Publication 180-3, the Secure Hash Standard, and Request for Comments
AGENCY: National Institute of Standards and Technology, Commerce.
ACTION: Notice and request for comments.
-----------------------------------------------------------------------
SUMMARY: This notice announces the Draft Federal Information Processing
Standard (FIPS) 180-3, Secure Hash Standard (SHS), for public review
and comment. The draft standard, designated ``Draft FIPS 180-3,'' is
proposed to supersede FIPS 180-2. FIPS 180-2, Secure Hash Standard
(SHS), August 2002, specifies secure hash algorithms (SHA) called SHA-
1, SHA-256, SHA-384 and SHA-512. These algorithms produce 160, 256,
384, and 512-bit outputs, respectively, which are called message
digests. An additional secure hash algorithm, called SHA-224, that
produces a 224-bit output, is specified in Change Notice 1 to FIPS 180-
2, which was issued in 2004. Draft FIPS 180-3 specifies five secure
hash algorithms: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. The
proposed standard is available at https://csrc.nist.gov/publications/
drafts.html.
Prior to the submission of this proposed standard to the Secretary
of Commerce for review and approval, it is essential that consideration
be given to the needs and views of the public, users, the information
technology industry, and Federal, State, and local government
organizations. The purpose of this notice is to solicit such views.
DATES: Comments must be received by September 10, 2007.
ADDRESSES: Written comments may be sent to: Chief, Computer Security
Division, Information Technology Laboratory, Attention: Comments on
Draft FIPS 180-3, 100 Bureau Drive--Stop 8930, National Institute of
Standards and Technology, Gaithersburg, MD 20899-8930. Electronic
comments may be sent to: Proposed180-3@nist.gov. The current FIPS 180-2
and its proposed replacement, Draft FIPS 180-3, are available
electronically at https://csrc.nist.gov/publications/.
Comments received in response to this notice will be published
electronically at https://csrc.nist.gov/CryptoToolkit/tkhash.html.
FOR FURTHER INFORMATION CONTACT: For general information, contact:
Elaine Barker, National Institute of Standards and Technology, Stop
8930, Gaithersburg, MD 20899-8930, telephone: 301-975-2911, e-mail:
elaine.barker@nist.gov. or via fax at 301-975-8670, or Quynh Dang,
telephone: 301-975-3610, e-mail: quynh.dang@nist.gov.
SUPPLEMENTARY INFORMATION: The changes between FIPS 180-2 and FIPS 180-
3 are minor and are motivated by a desire to put informative
information that is subject to change in a less formal publication that
can be readily updated as necessary. FIPS 180-2 contained statements
about the security strengths of the hash algorithms. However, the
security strengths of the hashing algorithms, SHA-1, SHA-224, SHA-256,
SHA-384 and SHA-512, might change due to future cryptanalysis;
consequently, Draft FIPS 180-3 does not describe their security
strengths. Instead, the security strengths will be specified in NIST
Special Publications (SP) 800-57, Recommendation for Key Management,
and discussed in NIST SP 800-107, Recommendation for Using Approved
Hash Algorithms. These Special Publications will be periodically
reviewed and updated if warranted by advances in the cryptanalysis of
these hash algorithms. Examples of the implementation of these hash
algorithms can be found at https://www.nist.gov/CryptoToolkitExamples.
NIST Special Publications are available at: https://csrc.nist.gov/
publications/.
Authority: NIST activities to develop computer security
standards to protect Federal sensitive (unclassified) systems are
undertaken pursuant to specific responsibilities assigned to NIST by
section 20 of the National Institute of Standards and Technology Act
(5 U.S.C. 278g-3) as amended by section 303 of the Federal
Information Security Management Act of 2002 (Pub. L. 107-347).
Executive Order 12866: This notice has been determined not to be
significant for the purpose of Executive Order 12866.
Dated: June 5, 2007.
James M. Turner,
Deputy Director, NIST.
[FR Doc. E7-11326 Filed 6-11-07; 8:45 am]
BILLING CODE 3510-13-P