Announcing Draft Federal Information Processing Standard 180-4, Secure Hash Standard, and Request for Comments, 7817-7818 [2011-3129]
Download as PDF
Federal Register / Vol. 76, No. 29 / Friday, February 11, 2011 / Notices
jlentini on DSKJ8SOYB1PROD with NOTICES
Background
On September 1, 2010, the
Department published a notice of
opportunity to request an administrative
review of the countervailing duty order
on OTR Tires from the PRC. See
Antidumping or Countervailing Duty
Order, Finding, or Suspended
Investigation; Opportunity To Request
Administrative Review, 75 FR 53635
(September 1, 2010). TUTRIC timely
requested an administrative review of
the countervailing duty order on OTR
Tires from the PRC for the period
January 1, 2009, through December 31,
2009. In addition, the Department
received timely requests from eight
other parties: Shandong Huitong Tyre
Co., Ltd.; Qingdao Hengda Tyres Co.,
Ltd.; Qingdao Sinorient International
Ltd.; Qingdao Qizhou Rubber Co., Ltd.;
Techking Tires Limited; Qingda Etyre
International Trade Co., Ltd.; Wengdeng
Sanfeng Tyre Co., Ltd.; and Guizhou
Tyre Co., Ltd., along with its affiliates,
Guizhou Advanced Rubber Co., Ltd.,
and Guizhou Tyre Import and Export
Corporation (collectively, Guizhou
Tyre). No other party requested a review
of these parties. In accordance with
section 751(a)(1) of the Tariff Act of
1930, as amended (the Act) and 19 CFR
351.221(c)(1)(i), the Department
published a notice initiating an
administrative review of the
countervailing duty order. See Initiation
of Antidumping and Countervailing
Duty Administrative Reviews, 75 FR
66349, 66351 (October 28, 2010).
On November 30, 2010, the
Department rescinded the review with
respect to Guizhou Tyre, pursuant to a
timely withdrawal of its request for
review. See Certain New Pneumatic Offthe-Road Tires From the People’s
Republic of China: Partial Rescission of
Countervailing Duty Administrative
Review, 75 FR 74003 (November 30,
2010). On December 10, 2010, the
Department rescinded the review with
respect to: Shandong Huitong Tyre Co.,
Ltd.; Qingdao Hengda Tyres Co., Ltd.;
Qingdao Sinorient International Ltd.;
Qingdao Qizhou Rubber Co., Ltd.;
Techking Tires Limited; Qingda Etyre
International Trade Co., Ltd.; and
Wengdeng Sanfeng Tyre Co., Ltd.,
pursuant to timely withdrawals of their
requests for review. See Certain New
Pneumatic Off-the-Road Tires From the
People’s Republic of China: Rescission,
in Part, of Countervailing Duty
Administrative Review, 75 FR 76956
(December 10, 2010).
Rescission of Countervailing Duty
Administrative Review
The Department’s regulations provide
that the Department will rescind an
administrative review if the party that
requested the review withdraws its
request for review within 90 days of the
date of publication of the notice of
initiation. See 19 CFR 351.213(d)(1).
TUTRIC timely withdrew its request on
January 25, 2011, within the 90-day
deadline. Therefore, as no other party
requested a review of TUTRIC, and as
we have already rescinded the review of
all other parties initially subject to this
segment of the proceeding, in
accordance with 19 CFR 351.213(d)(1),
the Department is fully rescinding this
administrative review of the
countervailing duty order.
Assessment
Entries exported by TUTRIC are
subject to the injunction issued by the
U.S. Court of International Trade
pursuant to ongoing litigation. Once the
injunction is lifted, the Department will
instruct U.S. Customs and Border
Protection to assess countervailing
duties on all appropriate entries. For
TUTRIC, countervailing duties shall be
assessed at rates equal to the cash
deposit or bonding rate of the estimated
countervailing duties required at the
time of entry, or withdrawal from
warehouse, for consumption, in
accordance with 19 CFR
351.212(c)(1)(i).
Notification Regarding Administrative
Protective Order
This notice serves as a final reminder
to parties subject to administrative
protective order (APO) of their
responsibility concerning the
disposition of proprietary information
disclosed under APO in accordance
with 19 CFR 351.305(a)(3), which
continues to govern business
proprietary information in this segment
of the proceeding. Timely written
notification of the return/destruction of
APO materials or conversion to judicial
protective order is hereby requested.
Failure to comply with the regulations
and terms of an APO is a violation
which is subject to sanction.
This notice is issued and published in
accordance with sections 751(a)(1) and
777(i)(1) of the Act, and 19 CFR
351.213(d)(4).
Dated: February 7, 2011.
Christian Marsh,
Deputy Assistant Secretary for Antidumping
and Countervailing Duty Operations.
[FR Doc. 2011–3132 Filed 2–10–11; 8:45 am]
BILLING CODE 3510–DS–P
VerDate Mar<15>2010
18:55 Feb 10, 2011
Jkt 223001
PO 00000
Frm 00011
Fmt 4703
Sfmt 4703
7817
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket No. 110107015–0497–02]
Announcing Draft Federal Information
Processing Standard 180–4, Secure
Hash Standard, and Request for
Comments
National Institute of Standards
and Technology (NIST), Commerce.
ACTION: Notice and request for
comments.
AGENCY:
This notice announces the
Draft Federal Information Processing
Standard (FIPS) 180–4, Secure Hash
Standard (SHS), for public review and
comment. The draft standard,
designated ‘‘Draft FIPS 180–4’’ is
proposed to supersede FIPS 180–3.
DATES: Comments must be received on
or before May 12, 2011.
ADDRESSES: Written comments may be
sent to: Chief, Computer Security
Division, Information Technology
Laboratory, Attention: Comments on
Draft FIPS 180–4, 100 Bureau Drive—
Stop 8930, National Institute of
Standards and Technology,
Gaithersburg, MD 20899–8930.
Electronic comments may be sent to:
Proposed180–4@nist.gov.
The current FIPS 180–3 and its
proposed replacement, Draft FIPS 180–
4, are available electronically at https://
csrc.nist.gov/publications/.
Comments received in response to
this notice will be published
electronically at https://csrc.nist.gov/
CryptoToolkit/.
FOR FURTHER INFORMATION CONTACT:
Elaine Barker, Computer Security
Division, National Institute of Standards
and Technology, Gaithersburg, MD
20899–8930, phone: 301–975–2911, email: elaine.barker@nist.gov; or Quynh
Dang, Computer Security Division,
National Institute of Standards and
Technology, Gaithersburg, MD 20899–
8930, e-mail: quynh.dang@nist.gov.
SUPPLEMENTARY INFORMATION: NIST
publishes this notice to request
comments on Draft FIPS 180–4, Secure
Hash Standard (SHS), which updates
FIPS 180–3, Secure Hash Standard,
which was approved in October 2008.
FIPS 180–3 specifies five secure hash
algorithms (SHAs): SHA–1, SHA–224,
SHA–256, SHA–384 and SHA–512.
These algorithms produce 160, 224, 256,
384, and 512-bit outputs, respectively,
which are called message digests. Draft
FIPS 180–4 would update FIPS 180–3
by providing a general procedure for
creating an initialization hash value,
SUMMARY:
E:\FR\FM\11FEN1.SGM
11FEN1
7818
Federal Register / Vol. 76, No. 29 / Friday, February 11, 2011 / Notices
adding two additional secure hash
algorithms, SHA–512/224 and SHA–
512/256, to the standard, and removing
a restriction that padding must be done
before hash computation begins, which
was required in FIPS 180–3. NIST
proposes adding SHA–512/224 and
SHA–512/256 to Draft FIPS 180–4
because they may be more efficient
alternatives to SHA–256 on platforms
that are optimized for 64-bit operations.
Removing the restriction on the padding
operation in the secure hash algorithms
will potentially create more flexibility
and efficiency in implementing the
secure hash algorithms in many
computer network applications.
Examples of the implementation of the
secure hash algorithms SHA–1, SHA–
224, SHA–256, SHA–384, SHA–512,
SHA–512/224 and SHA–512/256, can be
found at https://www.nist.gov/
CryptoToolkitExamples. If approved by
the Secretary of Commerce, Draft FIPS
180–4 will supersede FIPS 180–3.
Prior to the approval of this proposed
standard by the Secretary of Commerce,
it is essential that consideration be
given to the needs and views of the
public, users, the information
technology industry, and Federal, State,
and local government organizations.
The purpose of this notice is to solicit
such views. Interested parties may view
or download the proposed standard at
https://csrc.nist.gov/publications/
drafts.html.
Authority: NIST’s activities to develop
computer security standards to protect
Federal sensitive (unclassified) systems
are undertaken pursuant to specific
responsibilities assigned to NIST in
Section 5131 of the Information
Technology Management Reform Act of
1996 (Pub. L. 104–106), the Computer
Security Act of 1987 (Pub. L. 100–235),
and Appendix III to Office of
Management and Budget Circular A–
130.
Dated: February 7, 2011.
Charles H. Romine,
Acting Associate Director for Laboratory
Programs.
[FR Doc. 2011–3129 Filed 2–10–11; 8:45 am]
BILLING CODE 3510–13–P
jlentini on DSKJ8SOYB1PROD with NOTICES
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
Announcing a Meeting of the
Information Security and Privacy
Advisory Board
National Institute of Standards
and Technology, Commerce.
AGENCY:
VerDate Mar<15>2010
18:55 Feb 10, 2011
Jkt 223001
ACTION:
Notice.
The Information Security and
Privacy Advisory Board (ISPAB) will
meet Wednesday, March 2, 2011, from
8:30 a.m. until 4:45 p.m., Thursday,
March 3, 2011, from 8:30 a.m. until 5:30
p.m., and Friday, March 4, 2011 from
8:30 a.m. until 12:30 p.m. All sessions
will be open to the public.
DATES: The meeting will be held on
Wednesday, March 2, 2011, from 8:30
a.m. until 4:45 p.m., Thursday, March 3,
2011, from 8:30 a.m. until 5:30 p.m.,
and Friday, March 4, 2011 from 8:30
a.m. until 12:30 p.m.
ADDRESSES: The meeting will take place
at the Homewood Suites by Washington,
1475 Massachusetts Avenue, NW.,
Washington, DC 20005 on March 2, 3,
and 4, 2011.
FOR FURTHER INFORMATION CONTACT: Ms.
Annie Sokol, Information Technology
Laboratory, National Institute of
Standards and Technology, 100 Bureau
Drive, Stop 8930, Gaithersburg, MD
20899–8930, telephone: (301) 975–2006.
SUPPLEMENTARY INFORMATION: Pursuant
to the Federal Advisory Committee Act,
5 U.S.C. App., notice is hereby given
that the ISPAB will meet on
Wednesday, March 2, 2011, from 8:30
a.m. until 4:45 p.m., Thursday, March 3,
2011, from 8:30 a.m. until 5:30 p.m.,
and Friday, March 4, 2011 from 8:30
a.m. until 12:30 p.m. All sessions will
be open to the public. The ISPAB was
established by the Computer Security
Act of 1987 (Pub. L. 100–235) and
amended by the Federal Information
Security Management Act of 2002 (Pub.
L. 107–347) to advise the Secretary of
Commerce and the Director of NIST on
security and privacy issues pertaining to
Federal computer systems. Details
regarding the ISPAB’s activities are
available at https://csrc.nist.gov/groups/
SMA/ispab/.
The agenda is expected to include the
following items:
—Direct Hiring Panel discussion on
Federal hiring process, especially for
technical and security personnel,
—Presentation on National Strategy for
Trusted Identities in Cyberspace
(NSTIC) to discuss implementation
plan,
—Presentation on Science of Security
relating to computer security research,
—Presentation on Access of Classified
Information,
—Medical Device Vendor Panel
discussion of security, anti-virus and
patching issues,
—CIO Panel discussion on Security of
Federal Automated Information
Resources (Appendix III to OMB
Circular No. A–130),
SUMMARY:
PO 00000
Frm 00012
Fmt 4703
Sfmt 4703
—Update on the Federal Risk and
Authorization Management Program
(FedRAMP),
—DHS updates, including DOD–DHS
personnel exchange MOU,
—Presentation on HSPD 12 (Policy for
a Common Identification Standard for
Federal Employees and Contractors)
and progress of logical access,
—Panel discussion on lessons learned
from National Cybersecurity and
Communications, Integration Center
and CyberStorm,
—A panel of Inspector Generals
regarding privacy and security, and
—Update on NIST Computer Security
Division.
Note that agenda items may change
without notice because of possible
unexpected schedule conflicts of
presenters. The final agenda will be
posted on the Web site indicated above.
Public Participation: The ISPAB
agenda will include a period of time,
not to exceed thirty minutes, for oral
comments from the public (Friday,
March 4, 2011, at 9:30 a.m.–10 a.m.).
Each speaker will be limited to five
minutes. Members of the public who are
interested in speaking are asked to
contact Ms. Annie Sokol at the
telephone number indicated above. In
addition, written statements are invited
and may be submitted to the ISPAB at
any time. Written statements should be
directed to the ISPAB Secretariat,
Information Technology Laboratory, 100
Bureau Drive, Stop 8930, National
Institute of Standards and Technology,
Gaithersburg, MD 20899–8930.
Approximately 15 seats will be available
for the public and media.
Dated: February 7, 2011.
Charles H. Romine,
Acting Associate Director for Laboratory
Programs.
[FR Doc. 2011–3122 Filed 2–10–11; 8:45 am]
BILLING CODE 3510–13–P
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket No. 101006483–1035–02]
Correction to Notice Soliciting
Comments on Proposed Voluntary
Product Standard PS 2–10 and
Reopening of Comment Period
National Institute of Standards
and Technology, Commerce.
ACTION: Correction to notice and request
for comments.
AGENCY:
On October 29, 2010, the
National Institute of Standards and
Technology published a notice in the
SUMMARY:
E:\FR\FM\11FEN1.SGM
11FEN1
Agencies
[Federal Register Volume 76, Number 29 (Friday, February 11, 2011)]
[Notices]
[Pages 7817-7818]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-3129]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No. 110107015-0497-02]
Announcing Draft Federal Information Processing Standard 180-4,
Secure Hash Standard, and Request for Comments
AGENCY: National Institute of Standards and Technology (NIST),
Commerce.
ACTION: Notice and request for comments.
-----------------------------------------------------------------------
SUMMARY: This notice announces the Draft Federal Information Processing
Standard (FIPS) 180-4, Secure Hash Standard (SHS), for public review
and comment. The draft standard, designated ``Draft FIPS 180-4'' is
proposed to supersede FIPS 180-3.
DATES: Comments must be received on or before May 12, 2011.
ADDRESSES: Written comments may be sent to: Chief, Computer Security
Division, Information Technology Laboratory, Attention: Comments on
Draft FIPS 180-4, 100 Bureau Drive--Stop 8930, National Institute of
Standards and Technology, Gaithersburg, MD 20899-8930.
Electronic comments may be sent to: Proposed180-4@nist.gov.
The current FIPS 180-3 and its proposed replacement, Draft FIPS
180-4, are available electronically at https://csrc.nist.gov/publications/.
Comments received in response to this notice will be published
electronically at https://csrc.nist.gov/CryptoToolkit/.
FOR FURTHER INFORMATION CONTACT: Elaine Barker, Computer Security
Division, National Institute of Standards and Technology, Gaithersburg,
MD 20899-8930, phone: 301-975-2911, e-mail: elaine.barker@nist.gov; or
Quynh Dang, Computer Security Division, National Institute of Standards
and Technology, Gaithersburg, MD 20899-8930, e-mail:
quynh.dang@nist.gov.
SUPPLEMENTARY INFORMATION: NIST publishes this notice to request
comments on Draft FIPS 180-4, Secure Hash Standard (SHS), which updates
FIPS 180-3, Secure Hash Standard, which was approved in October 2008.
FIPS 180-3 specifies five secure hash algorithms (SHAs): SHA-1, SHA-
224, SHA-256, SHA-384 and SHA-512. These algorithms produce 160, 224,
256, 384, and 512-bit outputs, respectively, which are called message
digests. Draft FIPS 180-4 would update FIPS 180-3 by providing a
general procedure for creating an initialization hash value,
[[Page 7818]]
adding two additional secure hash algorithms, SHA-512/224 and SHA-512/
256, to the standard, and removing a restriction that padding must be
done before hash computation begins, which was required in FIPS 180-3.
NIST proposes adding SHA-512/224 and SHA-512/256 to Draft FIPS 180-4
because they may be more efficient alternatives to SHA-256 on platforms
that are optimized for 64-bit operations. Removing the restriction on
the padding operation in the secure hash algorithms will potentially
create more flexibility and efficiency in implementing the secure hash
algorithms in many computer network applications. Examples of the
implementation of the secure hash algorithms SHA-1, SHA-224, SHA-256,
SHA-384, SHA-512, SHA-512/224 and SHA-512/256, can be found at https://www.nist.gov/CryptoToolkitExamples. If approved by the Secretary of
Commerce, Draft FIPS 180-4 will supersede FIPS 180-3.
Prior to the approval of this proposed standard by the Secretary of
Commerce, it is essential that consideration be given to the needs and
views of the public, users, the information technology industry, and
Federal, State, and local government organizations. The purpose of this
notice is to solicit such views. Interested parties may view or
download the proposed standard at https://csrc.nist.gov/publications/drafts.html.
Authority: NIST's activities to develop computer security standards
to protect Federal sensitive (unclassified) systems are undertaken
pursuant to specific responsibilities assigned to NIST in Section 5131
of the Information Technology Management Reform Act of 1996 (Pub. L.
104-106), the Computer Security Act of 1987 (Pub. L. 100-235), and
Appendix III to Office of Management and Budget Circular A-130.
Dated: February 7, 2011.
Charles H. Romine,
Acting Associate Director for Laboratory Programs.
[FR Doc. 2011-3129 Filed 2-10-11; 8:45 am]
BILLING CODE 3510-13-P