Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request for Comments, 7817-7818 [2011-3129]

Download as PDF Federal Register / Vol. 76, No. 29 / Friday, February 11, 2011 / Notices jlentini on DSKJ8SOYB1PROD with NOTICES Background On September 1, 2010, the Department published a notice of opportunity to request an administrative review of the countervailing duty order on OTR Tires from the PRC. See Antidumping or Countervailing Duty Order, Finding, or Suspended Investigation; Opportunity To Request Administrative Review, 75 FR 53635 (September 1, 2010). TUTRIC timely requested an administrative review of the countervailing duty order on OTR Tires from the PRC for the period January 1, 2009, through December 31, 2009. In addition, the Department received timely requests from eight other parties: Shandong Huitong Tyre Co., Ltd.; Qingdao Hengda Tyres Co., Ltd.; Qingdao Sinorient International Ltd.; Qingdao Qizhou Rubber Co., Ltd.; Techking Tires Limited; Qingda Etyre International Trade Co., Ltd.; Wengdeng Sanfeng Tyre Co., Ltd.; and Guizhou Tyre Co., Ltd., along with its affiliates, Guizhou Advanced Rubber Co., Ltd., and Guizhou Tyre Import and Export Corporation (collectively, Guizhou Tyre). No other party requested a review of these parties. In accordance with section 751(a)(1) of the Tariff Act of 1930, as amended (the Act) and 19 CFR 351.221(c)(1)(i), the Department published a notice initiating an administrative review of the countervailing duty order. See Initiation of Antidumping and Countervailing Duty Administrative Reviews, 75 FR 66349, 66351 (October 28, 2010). On November 30, 2010, the Department rescinded the review with respect to Guizhou Tyre, pursuant to a timely withdrawal of its request for review. See Certain New Pneumatic Offthe-Road Tires From the People’s Republic of China: Partial Rescission of Countervailing Duty Administrative Review, 75 FR 74003 (November 30, 2010). On December 10, 2010, the Department rescinded the review with respect to: Shandong Huitong Tyre Co., Ltd.; Qingdao Hengda Tyres Co., Ltd.; Qingdao Sinorient International Ltd.; Qingdao Qizhou Rubber Co., Ltd.; Techking Tires Limited; Qingda Etyre International Trade Co., Ltd.; and Wengdeng Sanfeng Tyre Co., Ltd., pursuant to timely withdrawals of their requests for review. See Certain New Pneumatic Off-the-Road Tires From the People’s Republic of China: Rescission, in Part, of Countervailing Duty Administrative Review, 75 FR 76956 (December 10, 2010). Rescission of Countervailing Duty Administrative Review The Department’s regulations provide that the Department will rescind an administrative review if the party that requested the review withdraws its request for review within 90 days of the date of publication of the notice of initiation. See 19 CFR 351.213(d)(1). TUTRIC timely withdrew its request on January 25, 2011, within the 90-day deadline. Therefore, as no other party requested a review of TUTRIC, and as we have already rescinded the review of all other parties initially subject to this segment of the proceeding, in accordance with 19 CFR 351.213(d)(1), the Department is fully rescinding this administrative review of the countervailing duty order. Assessment Entries exported by TUTRIC are subject to the injunction issued by the U.S. Court of International Trade pursuant to ongoing litigation. Once the injunction is lifted, the Department will instruct U.S. Customs and Border Protection to assess countervailing duties on all appropriate entries. For TUTRIC, countervailing duties shall be assessed at rates equal to the cash deposit or bonding rate of the estimated countervailing duties required at the time of entry, or withdrawal from warehouse, for consumption, in accordance with 19 CFR 351.212(c)(1)(i). Notification Regarding Administrative Protective Order This notice serves as a final reminder to parties subject to administrative protective order (APO) of their responsibility concerning the disposition of proprietary information disclosed under APO in accordance with 19 CFR 351.305(a)(3), which continues to govern business proprietary information in this segment of the proceeding. Timely written notification of the return/destruction of APO materials or conversion to judicial protective order is hereby requested. Failure to comply with the regulations and terms of an APO is a violation which is subject to sanction. This notice is issued and published in accordance with sections 751(a)(1) and 777(i)(1) of the Act, and 19 CFR 351.213(d)(4). Dated: February 7, 2011. Christian Marsh, Deputy Assistant Secretary for Antidumping and Countervailing Duty Operations. [FR Doc. 2011–3132 Filed 2–10–11; 8:45 am] BILLING CODE 3510–DS–P VerDate Mar<15>2010 18:55 Feb 10, 2011 Jkt 223001 PO 00000 Frm 00011 Fmt 4703 Sfmt 4703 7817 DEPARTMENT OF COMMERCE National Institute of Standards and Technology [Docket No. 110107015–0497–02] Announcing Draft Federal Information Processing Standard 180–4, Secure Hash Standard, and Request for Comments National Institute of Standards and Technology (NIST), Commerce. ACTION: Notice and request for comments. AGENCY: This notice announces the Draft Federal Information Processing Standard (FIPS) 180–4, Secure Hash Standard (SHS), for public review and comment. The draft standard, designated ‘‘Draft FIPS 180–4’’ is proposed to supersede FIPS 180–3. DATES: Comments must be received on or before May 12, 2011. ADDRESSES: Written comments may be sent to: Chief, Computer Security Division, Information Technology Laboratory, Attention: Comments on Draft FIPS 180–4, 100 Bureau Drive— Stop 8930, National Institute of Standards and Technology, Gaithersburg, MD 20899–8930. Electronic comments may be sent to: Proposed180–4@nist.gov. The current FIPS 180–3 and its proposed replacement, Draft FIPS 180– 4, are available electronically at https:// csrc.nist.gov/publications/. Comments received in response to this notice will be published electronically at https://csrc.nist.gov/ CryptoToolkit/. FOR FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD 20899–8930, phone: 301–975–2911, email: elaine.barker@nist.gov; or Quynh Dang, Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD 20899– 8930, e-mail: quynh.dang@nist.gov. SUPPLEMENTARY INFORMATION: NIST publishes this notice to request comments on Draft FIPS 180–4, Secure Hash Standard (SHS), which updates FIPS 180–3, Secure Hash Standard, which was approved in October 2008. FIPS 180–3 specifies five secure hash algorithms (SHAs): SHA–1, SHA–224, SHA–256, SHA–384 and SHA–512. These algorithms produce 160, 224, 256, 384, and 512-bit outputs, respectively, which are called message digests. Draft FIPS 180–4 would update FIPS 180–3 by providing a general procedure for creating an initialization hash value, SUMMARY: E:\FR\FM\11FEN1.SGM 11FEN1 7818 Federal Register / Vol. 76, No. 29 / Friday, February 11, 2011 / Notices adding two additional secure hash algorithms, SHA–512/224 and SHA– 512/256, to the standard, and removing a restriction that padding must be done before hash computation begins, which was required in FIPS 180–3. NIST proposes adding SHA–512/224 and SHA–512/256 to Draft FIPS 180–4 because they may be more efficient alternatives to SHA–256 on platforms that are optimized for 64-bit operations. Removing the restriction on the padding operation in the secure hash algorithms will potentially create more flexibility and efficiency in implementing the secure hash algorithms in many computer network applications. Examples of the implementation of the secure hash algorithms SHA–1, SHA– 224, SHA–256, SHA–384, SHA–512, SHA–512/224 and SHA–512/256, can be found at https://www.nist.gov/ CryptoToolkitExamples. If approved by the Secretary of Commerce, Draft FIPS 180–4 will supersede FIPS 180–3. Prior to the approval of this proposed standard by the Secretary of Commerce, it is essential that consideration be given to the needs and views of the public, users, the information technology industry, and Federal, State, and local government organizations. The purpose of this notice is to solicit such views. Interested parties may view or download the proposed standard at https://csrc.nist.gov/publications/ drafts.html. Authority: NIST’s activities to develop computer security standards to protect Federal sensitive (unclassified) systems are undertaken pursuant to specific responsibilities assigned to NIST in Section 5131 of the Information Technology Management Reform Act of 1996 (Pub. L. 104–106), the Computer Security Act of 1987 (Pub. L. 100–235), and Appendix III to Office of Management and Budget Circular A– 130. Dated: February 7, 2011. Charles H. Romine, Acting Associate Director for Laboratory Programs. [FR Doc. 2011–3129 Filed 2–10–11; 8:45 am] BILLING CODE 3510–13–P jlentini on DSKJ8SOYB1PROD with NOTICES DEPARTMENT OF COMMERCE National Institute of Standards and Technology Announcing a Meeting of the Information Security and Privacy Advisory Board National Institute of Standards and Technology, Commerce. AGENCY: VerDate Mar<15>2010 18:55 Feb 10, 2011 Jkt 223001 ACTION: Notice. The Information Security and Privacy Advisory Board (ISPAB) will meet Wednesday, March 2, 2011, from 8:30 a.m. until 4:45 p.m., Thursday, March 3, 2011, from 8:30 a.m. until 5:30 p.m., and Friday, March 4, 2011 from 8:30 a.m. until 12:30 p.m. All sessions will be open to the public. DATES: The meeting will be held on Wednesday, March 2, 2011, from 8:30 a.m. until 4:45 p.m., Thursday, March 3, 2011, from 8:30 a.m. until 5:30 p.m., and Friday, March 4, 2011 from 8:30 a.m. until 12:30 p.m. ADDRESSES: The meeting will take place at the Homewood Suites by Washington, 1475 Massachusetts Avenue, NW., Washington, DC 20005 on March 2, 3, and 4, 2011. FOR FURTHER INFORMATION CONTACT: Ms. Annie Sokol, Information Technology Laboratory, National Institute of Standards and Technology, 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899–8930, telephone: (301) 975–2006. SUPPLEMENTARY INFORMATION: Pursuant to the Federal Advisory Committee Act, 5 U.S.C. App., notice is hereby given that the ISPAB will meet on Wednesday, March 2, 2011, from 8:30 a.m. until 4:45 p.m., Thursday, March 3, 2011, from 8:30 a.m. until 5:30 p.m., and Friday, March 4, 2011 from 8:30 a.m. until 12:30 p.m. All sessions will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100–235) and amended by the Federal Information Security Management Act of 2002 (Pub. L. 107–347) to advise the Secretary of Commerce and the Director of NIST on security and privacy issues pertaining to Federal computer systems. Details regarding the ISPAB’s activities are available at https://csrc.nist.gov/groups/ SMA/ispab/. The agenda is expected to include the following items: —Direct Hiring Panel discussion on Federal hiring process, especially for technical and security personnel, —Presentation on National Strategy for Trusted Identities in Cyberspace (NSTIC) to discuss implementation plan, —Presentation on Science of Security relating to computer security research, —Presentation on Access of Classified Information, —Medical Device Vendor Panel discussion of security, anti-virus and patching issues, —CIO Panel discussion on Security of Federal Automated Information Resources (Appendix III to OMB Circular No. A–130), SUMMARY: PO 00000 Frm 00012 Fmt 4703 Sfmt 4703 —Update on the Federal Risk and Authorization Management Program (FedRAMP), —DHS updates, including DOD–DHS personnel exchange MOU, —Presentation on HSPD 12 (Policy for a Common Identification Standard for Federal Employees and Contractors) and progress of logical access, —Panel discussion on lessons learned from National Cybersecurity and Communications, Integration Center and CyberStorm, —A panel of Inspector Generals regarding privacy and security, and —Update on NIST Computer Security Division. Note that agenda items may change without notice because of possible unexpected schedule conflicts of presenters. The final agenda will be posted on the Web site indicated above. Public Participation: The ISPAB agenda will include a period of time, not to exceed thirty minutes, for oral comments from the public (Friday, March 4, 2011, at 9:30 a.m.–10 a.m.). Each speaker will be limited to five minutes. Members of the public who are interested in speaking are asked to contact Ms. Annie Sokol at the telephone number indicated above. In addition, written statements are invited and may be submitted to the ISPAB at any time. Written statements should be directed to the ISPAB Secretariat, Information Technology Laboratory, 100 Bureau Drive, Stop 8930, National Institute of Standards and Technology, Gaithersburg, MD 20899–8930. Approximately 15 seats will be available for the public and media. Dated: February 7, 2011. Charles H. Romine, Acting Associate Director for Laboratory Programs. [FR Doc. 2011–3122 Filed 2–10–11; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE National Institute of Standards and Technology [Docket No. 101006483–1035–02] Correction to Notice Soliciting Comments on Proposed Voluntary Product Standard PS 2–10 and Reopening of Comment Period National Institute of Standards and Technology, Commerce. ACTION: Correction to notice and request for comments. AGENCY: On October 29, 2010, the National Institute of Standards and Technology published a notice in the SUMMARY: E:\FR\FM\11FEN1.SGM 11FEN1

Agencies

[Federal Register Volume 76, Number 29 (Friday, February 11, 2011)]
[Notices]
[Pages 7817-7818]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-3129]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No. 110107015-0497-02]


Announcing Draft Federal Information Processing Standard 180-4, 
Secure Hash Standard, and Request for Comments

AGENCY: National Institute of Standards and Technology (NIST), 
Commerce.

ACTION: Notice and request for comments.

-----------------------------------------------------------------------

SUMMARY: This notice announces the Draft Federal Information Processing 
Standard (FIPS) 180-4, Secure Hash Standard (SHS), for public review 
and comment. The draft standard, designated ``Draft FIPS 180-4'' is 
proposed to supersede FIPS 180-3.

DATES: Comments must be received on or before May 12, 2011.

ADDRESSES: Written comments may be sent to: Chief, Computer Security 
Division, Information Technology Laboratory, Attention: Comments on 
Draft FIPS 180-4, 100 Bureau Drive--Stop 8930, National Institute of 
Standards and Technology, Gaithersburg, MD 20899-8930.
    Electronic comments may be sent to: Proposed180-4@nist.gov.
    The current FIPS 180-3 and its proposed replacement, Draft FIPS 
180-4, are available electronically at https://csrc.nist.gov/publications/.
    Comments received in response to this notice will be published 
electronically at https://csrc.nist.gov/CryptoToolkit/.

FOR FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security 
Division, National Institute of Standards and Technology, Gaithersburg, 
MD 20899-8930, phone: 301-975-2911, e-mail: elaine.barker@nist.gov; or 
Quynh Dang, Computer Security Division, National Institute of Standards 
and Technology, Gaithersburg, MD 20899-8930, e-mail: 
quynh.dang@nist.gov.

SUPPLEMENTARY INFORMATION: NIST publishes this notice to request 
comments on Draft FIPS 180-4, Secure Hash Standard (SHS), which updates 
FIPS 180-3, Secure Hash Standard, which was approved in October 2008. 
FIPS 180-3 specifies five secure hash algorithms (SHAs): SHA-1, SHA-
224, SHA-256, SHA-384 and SHA-512. These algorithms produce 160, 224, 
256, 384, and 512-bit outputs, respectively, which are called message 
digests. Draft FIPS 180-4 would update FIPS 180-3 by providing a 
general procedure for creating an initialization hash value,

[[Page 7818]]

adding two additional secure hash algorithms, SHA-512/224 and SHA-512/
256, to the standard, and removing a restriction that padding must be 
done before hash computation begins, which was required in FIPS 180-3. 
NIST proposes adding SHA-512/224 and SHA-512/256 to Draft FIPS 180-4 
because they may be more efficient alternatives to SHA-256 on platforms 
that are optimized for 64-bit operations. Removing the restriction on 
the padding operation in the secure hash algorithms will potentially 
create more flexibility and efficiency in implementing the secure hash 
algorithms in many computer network applications. Examples of the 
implementation of the secure hash algorithms SHA-1, SHA-224, SHA-256, 
SHA-384, SHA-512, SHA-512/224 and SHA-512/256, can be found at https://www.nist.gov/CryptoToolkitExamples. If approved by the Secretary of 
Commerce, Draft FIPS 180-4 will supersede FIPS 180-3.
    Prior to the approval of this proposed standard by the Secretary of 
Commerce, it is essential that consideration be given to the needs and 
views of the public, users, the information technology industry, and 
Federal, State, and local government organizations. The purpose of this 
notice is to solicit such views. Interested parties may view or 
download the proposed standard at https://csrc.nist.gov/publications/drafts.html.
    Authority: NIST's activities to develop computer security standards 
to protect Federal sensitive (unclassified) systems are undertaken 
pursuant to specific responsibilities assigned to NIST in Section 5131 
of the Information Technology Management Reform Act of 1996 (Pub. L. 
104-106), the Computer Security Act of 1987 (Pub. L. 100-235), and 
Appendix III to Office of Management and Budget Circular A-130.

    Dated: February 7, 2011.
Charles H. Romine,
Acting Associate Director for Laboratory Programs.
[FR Doc. 2011-3129 Filed 2-10-11; 8:45 am]
BILLING CODE 3510-13-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.