Federal Transition To Secure Hash Algorithm (SHA)-256, 11433 [2011-4662]
Download as PDF
Federal Register / Vol. 76, No. 41 / Wednesday, March 2, 2011 / Notices
Comment: The commenter supports
the USPTO’s decision to discontinue the
TC Index and encourages the USPTO to
redirect the resulting cost savings to
assist users in electronic environments
such as the Trademark Next Generation
program.
Response: Eliminating the TC Index
coding will allow the USPTO to devote
more of its limited resources to the
maintenance and improvement of the
USPTO Design Classification system,
which provides the public with more
precise search parameters than are
possible with the TC Index codes. It will
also allow the USPTO to devote more
resources to enhancing electronic
communications through the
Trademarks Next Generation
information technology initiative. In
connection with this initiative, the
USPTO is currently reviewing
suggestions for improvements to the
electronic systems and will begin
implementing many of them in the
coming months.
The USPTO invests heavily in its
publicly available electronic search
systems to ensure their maintenance,
and commits considerable resources to
enhancing and improving electronic
search capabilities. The USPTO is
dedicated to ensuring the quality and
accuracy of design coding under the
USPTO Design Classification system.
The USPTO Design Classification codes
will continue to be subject to internal
quality review and external review by
applicants, registrants and the public,
which further ensures correct design
coding.
Accordingly, the USPTO hereby gives
notice that the USPTO is discontinuing
coding design marks with paper search
designations.
Dated: February 24, 2011.
David J. Kappos,
Under Secretary of Commerce for Intellectual
Property and Director of the United States
Patent and Trademark Office.
[FR Doc. 2011–4618 Filed 3–1–11; 8:45 am]
BILLING CODE 3510–16–P
DEPARTMENT OF DEFENSE
emcdonald on DSK2BSOYB1PROD with NOTICES
GENERAL SERVICES
ADMINISTRATION
NATIONAL AERONAUTICS AND
SPACE ADMINISTRATION
[FAR–N–2011–01; Docket No. 2011–0083;
Sequence 1]
Federal Transition To Secure Hash
Algorithm (SHA)–256
Department of Defense (DoD),
General Services Administration (GSA),
AGENCY:
VerDate Mar<15>2010
16:34 Mar 01, 2011
Jkt 223001
and National Aeronautics and Space
Administration (NASA).
ACTION: Notice of public meeting.
The Civilian Agency
Acquisition Council, and the Defense
Acquisition Regulations Council
(Councils), are hosting the first of at
least two public meetings to start a
dialogue with industry and Government
agencies about ways for the acquisition
community to transition to Secure Hash
Algorithm SHA–256. SHA–256 is a
cryptographic hash function that is used
in digital signatures, and authentication
protocols.
DATES: Public Meeting: A public meeting
will be held on March 18, 2011, from 9
a.m. to 12 p.m. EST. Attendees should
register for the public meeting at least 1
week in advance to ensure adequate
room accommodations.
Registrants will be given priority if
room constraints require limits on
attendance. At the March 18th meeting,
two briefings will be provided on SHA–
256. One will be at the agency level, and
the other at the Federal level. Public
comments will be solicited after a
subsequent second public meeting.
Special Accommodations: The public
meeting is physically accessible to
people with disabilities. Requests for
sign language interpretation or other
auxiliary aids should be directed to Mr.
Edward Loeb, telephone (202) 501–
0650, at least 5 working days prior to
the meeting date.
ADDRESSES: Public Meeting: The public
meeting will be held in the General
Services Administration (GSA)
Multipurpose Room, 2nd floor, One
Constitution Square, 1275 First Street,
NE., Washington, DC 20417. Interested
parties may register by faxing the
following information to the GSA at
(202) 501–4067, or e-mail
edward.loeb@gsa.gov by March 11,
2011:
(1) Company or Organization Name;
(2) Names of persons attending; and
(3) Last four digits of the social
security number of persons attending.
Please cite ‘‘Federal Transition to Secure
Hash Algorithm SHA–256’’ in all
correspondence related to this public
meeting.
FOR FURTHER INFORMATION CONTACT: For
clarification of content, contact Mr.
Edward Loeb, Procurement Analyst, at
(202) 501–0650. For information
pertaining to status or publication
schedules, contact the Regulatory
Secretariat at (202) 501–4755. Please
cite ‘‘Federal Transition to Secure Hash
Algorithm SHA–256.’’
SUPPLEMENTARY INFORMATION: The
Federal environment uses SHA–1 for
SUMMARY:
PO 00000
Frm 00010
Fmt 4703
Sfmt 4703
11433
generating digital signatures. Current
information systems, Web servers,
applications and workstation operating
systems were designed to process, and
use SHA–1 generated signatures.
National Institute of Standards and
Technology (NIST) SP (Special
Publication) 800–57, Recommendation
for Key Management—Part 1, (the first
document); and NIST SP 800–78–3,
Cryptographic Algorithms and Key
Sizes for Personal Identification
Verification (PIV), at https://
csrc.nist.gov/publications/
PubsSPs.html, provide for the use of
SHA–256 in all digital signatures
generated. NIST has issued guidance for
transition to stronger cryptographic
keys, and more robust algorithms by
December 2013.
Government systems may begin to
encounter certificates signed with SHA–
256, and in most cases it is unclear
whether the Government systems will
continue to function correctly.
Dated: February 24, 2011.
Millisa Gary,
Acting Director, Office of Governmentwide
Acquisition Policy.
[FR Doc. 2011–4662 Filed 3–1–11; 8:45 am]
BILLING CODE 6820–EP–P
DEPARTMENT OF EDUCATION
Notice of Proposed Information
Collection Requests
Department of Education.
Comment request.
AGENCY:
ACTION:
The Department of Education
(the Department), in accordance with
the Paperwork Reduction Act of 1995
(PRA) (44 U.S.C. 3506(c)(2)(A)),
provides the general public and Federal
agencies with an opportunity to
comment on proposed and continuing
collections of information. This helps
the Department assess the impact of its
information collection requirements and
minimize the reporting burden on the
public and helps the public understand
the Department’s information collection
requirements and provide the requested
data in the desired format. The Director,
Information Collection Clearance
Division, Regulatory Information
Management Services, Office of
Management, invites comments on the
proposed information collection
requests as required by the Paperwork
Reduction Act of 1995.
DATES: Interested persons are invited to
submit comments on or before May 2,
2011.
ADDRESSES: Comments regarding burden
and/or the collection activity
SUMMARY:
E:\FR\FM\02MRN1.SGM
02MRN1
Agencies
[Federal Register Volume 76, Number 41 (Wednesday, March 2, 2011)]
[Notices]
[Page 11433]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-4662]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF DEFENSE
GENERAL SERVICES ADMINISTRATION
NATIONAL AERONAUTICS AND SPACE ADMINISTRATION
[FAR-N-2011-01; Docket No. 2011-0083; Sequence 1]
Federal Transition To Secure Hash Algorithm (SHA)-256
AGENCY: Department of Defense (DoD), General Services Administration
(GSA), and National Aeronautics and Space Administration (NASA).
ACTION: Notice of public meeting.
-----------------------------------------------------------------------
SUMMARY: The Civilian Agency Acquisition Council, and the Defense
Acquisition Regulations Council (Councils), are hosting the first of at
least two public meetings to start a dialogue with industry and
Government agencies about ways for the acquisition community to
transition to Secure Hash Algorithm SHA-256. SHA-256 is a cryptographic
hash function that is used in digital signatures, and authentication
protocols.
DATES: Public Meeting: A public meeting will be held on March 18, 2011,
from 9 a.m. to 12 p.m. EST. Attendees should register for the public
meeting at least 1 week in advance to ensure adequate room
accommodations.
Registrants will be given priority if room constraints require
limits on attendance. At the March 18th meeting, two briefings will be
provided on SHA-256. One will be at the agency level, and the other at
the Federal level. Public comments will be solicited after a subsequent
second public meeting.
Special Accommodations: The public meeting is physically accessible
to people with disabilities. Requests for sign language interpretation
or other auxiliary aids should be directed to Mr. Edward Loeb,
telephone (202) 501-0650, at least 5 working days prior to the meeting
date.
ADDRESSES: Public Meeting: The public meeting will be held in the
General Services Administration (GSA) Multipurpose Room, 2nd floor, One
Constitution Square, 1275 First Street, NE., Washington, DC 20417.
Interested parties may register by faxing the following information to
the GSA at (202) 501-4067, or e-mail edward.loeb@gsa.gov by March 11,
2011:
(1) Company or Organization Name;
(2) Names of persons attending; and
(3) Last four digits of the social security number of persons
attending.
Please cite ``Federal Transition to Secure Hash Algorithm SHA-256'' in
all correspondence related to this public meeting.
FOR FURTHER INFORMATION CONTACT: For clarification of content, contact
Mr. Edward Loeb, Procurement Analyst, at (202) 501-0650. For
information pertaining to status or publication schedules, contact the
Regulatory Secretariat at (202) 501-4755. Please cite ``Federal
Transition to Secure Hash Algorithm SHA-256.''
SUPPLEMENTARY INFORMATION: The Federal environment uses SHA-1 for
generating digital signatures. Current information systems, Web
servers, applications and workstation operating systems were designed
to process, and use SHA-1 generated signatures. National Institute of
Standards and Technology (NIST) SP (Special Publication) 800-57,
Recommendation for Key Management--Part 1, (the first document); and
NIST SP 800-78-3, Cryptographic Algorithms and Key Sizes for Personal
Identification Verification (PIV), at https://csrc.nist.gov/publications/PubsSPs.html, provide for the use of SHA-256 in all
digital signatures generated. NIST has issued guidance for transition
to stronger cryptographic keys, and more robust algorithms by December
2013.
Government systems may begin to encounter certificates signed with
SHA-256, and in most cases it is unclear whether the Government systems
will continue to function correctly.
Dated: February 24, 2011.
Millisa Gary,
Acting Director, Office of Governmentwide Acquisition Policy.
[FR Doc. 2011-4662 Filed 3-1-11; 8:45 am]
BILLING CODE 6820-EP-P