Federal Transition To Secure Hash Algorithm (SHA)-256, 11433 [2011-4662]

Download as PDF Federal Register / Vol. 76, No. 41 / Wednesday, March 2, 2011 / Notices Comment: The commenter supports the USPTO’s decision to discontinue the TC Index and encourages the USPTO to redirect the resulting cost savings to assist users in electronic environments such as the Trademark Next Generation program. Response: Eliminating the TC Index coding will allow the USPTO to devote more of its limited resources to the maintenance and improvement of the USPTO Design Classification system, which provides the public with more precise search parameters than are possible with the TC Index codes. It will also allow the USPTO to devote more resources to enhancing electronic communications through the Trademarks Next Generation information technology initiative. In connection with this initiative, the USPTO is currently reviewing suggestions for improvements to the electronic systems and will begin implementing many of them in the coming months. The USPTO invests heavily in its publicly available electronic search systems to ensure their maintenance, and commits considerable resources to enhancing and improving electronic search capabilities. The USPTO is dedicated to ensuring the quality and accuracy of design coding under the USPTO Design Classification system. The USPTO Design Classification codes will continue to be subject to internal quality review and external review by applicants, registrants and the public, which further ensures correct design coding. Accordingly, the USPTO hereby gives notice that the USPTO is discontinuing coding design marks with paper search designations. Dated: February 24, 2011. David J. Kappos, Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office. [FR Doc. 2011–4618 Filed 3–1–11; 8:45 am] BILLING CODE 3510–16–P DEPARTMENT OF DEFENSE emcdonald on DSK2BSOYB1PROD with NOTICES GENERAL SERVICES ADMINISTRATION NATIONAL AERONAUTICS AND SPACE ADMINISTRATION [FAR–N–2011–01; Docket No. 2011–0083; Sequence 1] Federal Transition To Secure Hash Algorithm (SHA)–256 Department of Defense (DoD), General Services Administration (GSA), AGENCY: VerDate Mar<15>2010 16:34 Mar 01, 2011 Jkt 223001 and National Aeronautics and Space Administration (NASA). ACTION: Notice of public meeting. The Civilian Agency Acquisition Council, and the Defense Acquisition Regulations Council (Councils), are hosting the first of at least two public meetings to start a dialogue with industry and Government agencies about ways for the acquisition community to transition to Secure Hash Algorithm SHA–256. SHA–256 is a cryptographic hash function that is used in digital signatures, and authentication protocols. DATES: Public Meeting: A public meeting will be held on March 18, 2011, from 9 a.m. to 12 p.m. EST. Attendees should register for the public meeting at least 1 week in advance to ensure adequate room accommodations. Registrants will be given priority if room constraints require limits on attendance. At the March 18th meeting, two briefings will be provided on SHA– 256. One will be at the agency level, and the other at the Federal level. Public comments will be solicited after a subsequent second public meeting. Special Accommodations: The public meeting is physically accessible to people with disabilities. Requests for sign language interpretation or other auxiliary aids should be directed to Mr. Edward Loeb, telephone (202) 501– 0650, at least 5 working days prior to the meeting date. ADDRESSES: Public Meeting: The public meeting will be held in the General Services Administration (GSA) Multipurpose Room, 2nd floor, One Constitution Square, 1275 First Street, NE., Washington, DC 20417. Interested parties may register by faxing the following information to the GSA at (202) 501–4067, or e-mail edward.loeb@gsa.gov by March 11, 2011: (1) Company or Organization Name; (2) Names of persons attending; and (3) Last four digits of the social security number of persons attending. Please cite ‘‘Federal Transition to Secure Hash Algorithm SHA–256’’ in all correspondence related to this public meeting. FOR FURTHER INFORMATION CONTACT: For clarification of content, contact Mr. Edward Loeb, Procurement Analyst, at (202) 501–0650. For information pertaining to status or publication schedules, contact the Regulatory Secretariat at (202) 501–4755. Please cite ‘‘Federal Transition to Secure Hash Algorithm SHA–256.’’ SUPPLEMENTARY INFORMATION: The Federal environment uses SHA–1 for SUMMARY: PO 00000 Frm 00010 Fmt 4703 Sfmt 4703 11433 generating digital signatures. Current information systems, Web servers, applications and workstation operating systems were designed to process, and use SHA–1 generated signatures. National Institute of Standards and Technology (NIST) SP (Special Publication) 800–57, Recommendation for Key Management—Part 1, (the first document); and NIST SP 800–78–3, Cryptographic Algorithms and Key Sizes for Personal Identification Verification (PIV), at https:// csrc.nist.gov/publications/ PubsSPs.html, provide for the use of SHA–256 in all digital signatures generated. NIST has issued guidance for transition to stronger cryptographic keys, and more robust algorithms by December 2013. Government systems may begin to encounter certificates signed with SHA– 256, and in most cases it is unclear whether the Government systems will continue to function correctly. Dated: February 24, 2011. Millisa Gary, Acting Director, Office of Governmentwide Acquisition Policy. [FR Doc. 2011–4662 Filed 3–1–11; 8:45 am] BILLING CODE 6820–EP–P DEPARTMENT OF EDUCATION Notice of Proposed Information Collection Requests Department of Education. Comment request. AGENCY: ACTION: The Department of Education (the Department), in accordance with the Paperwork Reduction Act of 1995 (PRA) (44 U.S.C. 3506(c)(2)(A)), provides the general public and Federal agencies with an opportunity to comment on proposed and continuing collections of information. This helps the Department assess the impact of its information collection requirements and minimize the reporting burden on the public and helps the public understand the Department’s information collection requirements and provide the requested data in the desired format. The Director, Information Collection Clearance Division, Regulatory Information Management Services, Office of Management, invites comments on the proposed information collection requests as required by the Paperwork Reduction Act of 1995. DATES: Interested persons are invited to submit comments on or before May 2, 2011. ADDRESSES: Comments regarding burden and/or the collection activity SUMMARY: E:\FR\FM\02MRN1.SGM 02MRN1

Agencies

[Federal Register Volume 76, Number 41 (Wednesday, March 2, 2011)]
[Notices]
[Page 11433]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-4662]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF DEFENSE

GENERAL SERVICES ADMINISTRATION

NATIONAL AERONAUTICS AND SPACE ADMINISTRATION

[FAR-N-2011-01; Docket No. 2011-0083; Sequence 1]


Federal Transition To Secure Hash Algorithm (SHA)-256

AGENCY: Department of Defense (DoD), General Services Administration 
(GSA), and National Aeronautics and Space Administration (NASA).

ACTION: Notice of public meeting.

-----------------------------------------------------------------------

SUMMARY: The Civilian Agency Acquisition Council, and the Defense 
Acquisition Regulations Council (Councils), are hosting the first of at 
least two public meetings to start a dialogue with industry and 
Government agencies about ways for the acquisition community to 
transition to Secure Hash Algorithm SHA-256. SHA-256 is a cryptographic 
hash function that is used in digital signatures, and authentication 
protocols.

DATES: Public Meeting: A public meeting will be held on March 18, 2011, 
from 9 a.m. to 12 p.m. EST. Attendees should register for the public 
meeting at least 1 week in advance to ensure adequate room 
accommodations.
    Registrants will be given priority if room constraints require 
limits on attendance. At the March 18th meeting, two briefings will be 
provided on SHA-256. One will be at the agency level, and the other at 
the Federal level. Public comments will be solicited after a subsequent 
second public meeting.
    Special Accommodations: The public meeting is physically accessible 
to people with disabilities. Requests for sign language interpretation 
or other auxiliary aids should be directed to Mr. Edward Loeb, 
telephone (202) 501-0650, at least 5 working days prior to the meeting 
date.

ADDRESSES: Public Meeting: The public meeting will be held in the 
General Services Administration (GSA) Multipurpose Room, 2nd floor, One 
Constitution Square, 1275 First Street, NE., Washington, DC 20417. 
Interested parties may register by faxing the following information to 
the GSA at (202) 501-4067, or e-mail edward.loeb@gsa.gov by March 11, 
2011:
    (1) Company or Organization Name;
    (2) Names of persons attending; and
    (3) Last four digits of the social security number of persons 
attending.

Please cite ``Federal Transition to Secure Hash Algorithm SHA-256'' in 
all correspondence related to this public meeting.

FOR FURTHER INFORMATION CONTACT: For clarification of content, contact 
Mr. Edward Loeb, Procurement Analyst, at (202) 501-0650. For 
information pertaining to status or publication schedules, contact the 
Regulatory Secretariat at (202) 501-4755. Please cite ``Federal 
Transition to Secure Hash Algorithm SHA-256.''

SUPPLEMENTARY INFORMATION: The Federal environment uses SHA-1 for 
generating digital signatures. Current information systems, Web 
servers, applications and workstation operating systems were designed 
to process, and use SHA-1 generated signatures. National Institute of 
Standards and Technology (NIST) SP (Special Publication) 800-57, 
Recommendation for Key Management--Part 1, (the first document); and 
NIST SP 800-78-3, Cryptographic Algorithms and Key Sizes for Personal 
Identification Verification (PIV), at https://csrc.nist.gov/publications/PubsSPs.html, provide for the use of SHA-256 in all 
digital signatures generated. NIST has issued guidance for transition 
to stronger cryptographic keys, and more robust algorithms by December 
2013.
    Government systems may begin to encounter certificates signed with 
SHA-256, and in most cases it is unclear whether the Government systems 
will continue to function correctly.

    Dated: February 24, 2011.
Millisa Gary,
Acting Director, Office of Governmentwide Acquisition Policy.
[FR Doc. 2011-4662 Filed 3-1-11; 8:45 am]
BILLING CODE 6820-EP-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.