Announcing Issuance of Federal Information Processing Standard (FIPS) 186-5, Digital Signature Standard, 7410-7413 [2023-02273]

Download as PDF 7410 Federal Register / Vol. 88, No. 23 / Friday, February 3, 2023 / Notices assessment rates based on the ratio of the total amount of dumping calculated for the examined sales to the total entered value of those sales. Where either the respondent’s weightedaverage dumping margin is zero or de minimis within the meaning of 19 CFR 351.106(c)(1), or an importer-specific assessment rate is zero or de minimis, we will instruct CBP to liquidate the appropriate entries without regard to antidumping duties.10 For entries of subject merchandise during the POR produced by the mandatory respondents for which they did not know their merchandise was destined for the United States, or for entries associated with Synn, which had no shipments during the POR, we will instruct CBP to liquidate unreviewed entries at the allothers rate if there is no rate for the intermediate company(ies) involved in the transaction. The final results of this review shall be the basis for the assessment of antidumping duties on entries of merchandise covered by the final results of this review and for future deposits of estimated duties, where applicable.11 Commerce intends to issue assessment instructions to CBP no earlier than 35 days after the date of publication of the final results of this review in the Federal Register. If a timely summons is filed at the U.S. Court of International Trade, the assessment instructions will direct CBP not to liquidate relevant entries until the time for parties to file a request for a statutory injunction has expired (i.e., within 90 days of publication). lotter on DSK11XQN23PROD with NOTICES1 Cash Deposit Requirements The following cash deposit requirements will be effective for all shipments of subject merchandise entered, or withdrawn from warehouse, for consumption on or after the publication date of the final results of this administrative review, as provided by section 751(a)(2)(C) of the Act: (1) the cash deposit rate for the companies listed above will be equal to the weighted-average dumping margins established in the final results of this administrative review; (2) for merchandise exported by producers or exporters not covered in this review but covered in a prior completed segment of the proceeding, the cash deposit rate will continue to be the company10 In these final results, Commerce applied the assessment rate calculation method adopted in Antidumping Proceedings: Calculation of the Weighted-Average Dumping Margin and Assessment Rate in Certain Antidumping Duty Proceedings; Final Modification, 77 FR 8101 (February 14, 2012). 11 See section 751(a)(2)(C) of the Act. VerDate Sep<11>2014 17:51 Feb 02, 2023 Jkt 259001 specific rate published for the most recent period; (3) if the exporter is not a firm covered in this review, a prior review, or the original investigation, but the producer has been covered in a prior complete segment of this proceeding, then the cash deposit rate will be the rate established for the most recent period for the producer of the merchandise; (4) the cash deposit rate for all other manufacturers or exporters will continue to be 3.66 percent,12 the all-others rate from the Amended Final Determination. These cash deposit requirements, when imposed, shall remain in effect until further notice. Notification to Importers This notice also serves as a final reminder to importers of their responsibility under 19 CFR 351.402(f)(2) to file a certificate regarding the reimbursement of antidumping duties prior to liquidation of the relevant entries during this review period. Failure to comply with this requirement could result in Commerce’s presumption that reimbursement of antidumping duties occurred and the subsequent assessment of double antidumping duties. Administrative Protective Order This notice also serves as a reminder to parties subject to an administrative protective order (APO) of their responsibility concerning the disposition of proprietary information disclosed under APO in accordance with 19 CFR 351.305(a)(3). Timely written notification of return/ destruction of APO materials or conversion to judicial protective order is hereby requested. Failure to comply with the regulations and the terms of an APO is a sanctionable violation. Notification to Interested Parties We are issuing and publishing these final results of administrative review in accordance with sections 751(a)(1) and 777(i) of the Act, and 19 CFR 351.221(b)(5). Dated: January 27, 2023. Lisa W. Wang, Assistant Secretary for Enforcement and Compliance. Appendix—List of Topics Discussed in the Issues and Decision Memorandum I. Summary II. Background 12 See Corrosion-Resistant Steel Products from Taiwan: Notice of Court Decision Not in Harmony with Final Determination of Antidumping Duty Investigation and Notice of Amended Final Determination of Investigation, 84 FR 6129 (February 26, 2019) (Amended Final Determination). PO 00000 Frm 00017 Fmt 4703 Sfmt 4703 III. Scope of the Order IV. Changes Since the Preliminary Results V. Discussion of the Issues Comment 1: Whether to Analyze Transactions between Prosperity and its Affiliate, Hong-Ye Steel Co., Ltd. (Hong Ye), Under Section 773(f)(2) of the Act, as well as Whether to Include Hong Ye’s Purchases in the Market Price Valuation Comment 2: Treatment of All Prosperity’s Home Market Sales Comment 3: Whether to Adjust Prosperity’s Production Quantities Assigned to Surrogate Costs VI. Recommendation [FR Doc. 2023–02213 Filed 2–2–23; 8:45 am] BILLING CODE 3510–DS–P DEPARTMENT OF COMMERCE National Institute of Standards and Technology [Docket No. 220923–0199] Announcing Issuance of Federal Information Processing Standard (FIPS) 186–5, Digital Signature Standard National Institute of Standards and Technology (NIST), Commerce. ACTION: Notice. AGENCY: This notice announces the Secretary of Commerce’s approval of Federal Information Processing Standard (FIPS) 186–5, Digital Signature Standard (DSS). FIPS 186–5 specifies three techniques for the generation and verification of digital signatures that can be used for the protection of data: the Rivest-Shamir-Adleman (RSA) Algorithm, the Elliptic Curve Digital Signature Algorithm (ECDSA), and the Edwards Curve Digital Signature Algorithm (EdDSA). The Digital Signature Algorithm (DSA), specified in prior versions of this standard, is retained only for the purposes of verifying existing signatures. DATES: FIPS 186–5 is effective on February 3, 2023. ADDRESSES: FIPS 186–5 is available electronically on the NIST Computer Security Resource Center website at https://csrc.nist.gov. Comments that were received on the proposed changes are published electronically at https:// csrc.nist.gov/publications/detail/fips/ 186/5/draft and at https:// www.regulations.gov. FOR FURTHER INFORMATION CONTACT: Dr. Dustin Moody, National Institute of Standards and Technology, 100 Bureau Drive, Mail Stop 8930, Gaithersburg, MD 20899–8930, email: Dustin.Moody@ nist.gov, phone: (301) 975–8136. SUPPLEMENTARY INFORMATION: FIPS 186 was initially developed by NIST in SUMMARY: E:\FR\FM\03FEN1.SGM 03FEN1 lotter on DSK11XQN23PROD with NOTICES1 Federal Register / Vol. 88, No. 23 / Friday, February 3, 2023 / Notices collaboration with the National Security Agency (NSA), using the NSA-designed Digital Signature Algorithm (DSA). Later versions of the standard approved the use of ECDSA (developed by Certicom) and RSA (developed by Ron Rivest, Adi Shamir and Leonard Adleman). American Standards Committee (ASC) X9 developed standards specifying both ECDSA and RSA that were used as the basis for the later revisions of FIPS 186. Since its original approval on May 10, 1994 (59 FR 26208), revisions of the FIPS were approved on December 15, 1998 as FIPS 186–1 (63 FR 69049) to include RSA, as specified in American National Standard (ANS) X9.31 (Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA)), and on February 15, 2000 as FIPS 186–2 (65 FR 7507) to include ECDSA and recommended elliptic curves to be used with ECDSA, as specified in ANS X9.62 (Elliptic Curve Digital Signature Algorithm (ECDSA)). On June 9, 2009, a third revision of the FIPS was approved as FIPS 186–3 (74 FR 27287) to (1) increase the key sizes for DSA, (2) provide additional requirements for the use of RSA and ECDSA, (3) allow the use of the RSA algorithm specified in Public Key Cryptography Standard (PKCS) #1 (RSA Cryptography Standard specified in Institute of Electrical and Electronics Engineers (IEEE) P1363, Standard Specifications for Public Key Cryptography), (4) include requirements for obtaining the assurances necessary for valid digital signatures, and (5) replace the random number generators specified in previous versions of the FIPS with a reference to NIST Special Publication (SP) 800–90 (Recommendation for Random Number Generation Using Deterministic Random Bit Generators). A fourth revision of the FIPS was approved as FIPS 186–4 (78 FR 43145) on July 19, 2013, which included (1) a reduction of the restrictions on the use of random number generators and the retention and use of prime number generation seeds, and (2) aligning the specification for the use of a random salt value in the RSASSA–PSS digital signature scheme with PKCS #1. Advances in the understanding of elliptic curves within the cryptographic community have led to the development of new elliptic curves and algorithms whose designers claim to offer better performance and which are easier to implement in a secure manner. In 2014, NIST’s Visiting Committee on Advanced Technology (VCAT) conducted a review of NIST’s cryptographic standards program. As part of their review, the VCAT recommended that NIST VerDate Sep<11>2014 17:51 Feb 02, 2023 Jkt 259001 ‘‘generate a new set of elliptic curves for use with ECDSA in FIPS 186.’’ See https://www.nist.gov/sites/default/files/ documents/2017/05/09/VCAT-Reporton-NIST-Cryptographic-Standards-andGuidelines-Process.pdf. In June 2015, NIST hosted a technical workshop on Elliptic Curve Cryptography Standards to discuss possible approaches to promote the adoption of secure, interoperable, and efficient elliptic curve mechanisms. Workshop participants expressed significant interest in the development, standardization, and adoption of new elliptic curves. In October 2015, NIST solicited comments on the elliptic curves and signature algorithms specified in FIPS 186–4 (80 FR 63539). The responses noted the broad use of the NIST prime curves and ECDSA within industry, but many commenters called for the standardization of new elliptic curves and signature algorithms. Based on the input received, NIST published a notice in the Federal Register (84 FR 58373) on October 31, 2019, requesting public comments on the proposed revision in draft FIPS 186– 5, along with accompanying technical guidelines in draft NIST Special Publication (SP) 800–186, Recommendations for DiscreteLogarithm Based Cryptography: Elliptic Curve Domain Parameters. NIST received 23 sets of comments: 3 from U.S. federal agencies, 1 from a foreign government agency, 16 from privatesector organizations, and 3 from private academics and technologists. The draft of FIPS 186–5 and the related technical guidelines in draft NIST SP 800–186 proposed adopting two new elliptic curves, Ed25519 and Ed448, for use with EdDSA. EdDSA is a deterministic elliptic curve signature scheme currently specified in the internet Research Task Force (IRTF) RFC 8032. FIPS 186–5 and SP 800–186 also proposed adopting a deterministic variant of ECDSA that is currently specified in RFC 6979. Based on feedback received on the adoption of the current elliptic curve standards, the drafts of FIPS 186–5 and SP 800–186 deprecated curves over binary fields due to their limited use by industry. Furthermore, NIST proposed the removal of DSA from the FIPS as an approved method for generating digital signatures because of limited use by industry and academic analyses finding that implementations of DSA may be vulnerable to attacks. The following is a summary and analysis of the comments received during the public comment period and NIST’s responses to them, including the PO 00000 Frm 00018 Fmt 4703 Sfmt 4703 7411 interests, concerns, recommendations, and issues considered in the development of FIPS 186–5: 1. Comment: One commenter requested that FIPS 186–5 include an additional digital signature scheme using elliptic curve cryptography, Schnorr 384, in order to support signatures with short lengths. Response: NIST does not see a broad demand or need for the Schnorr 384 signature scheme and declined to include it in FIPS 186–5. 2. Comment: One commenter requested that the standard be simplified and revised to highlight security tradeoffs of design choices. Response: The FIPS 186–5 revision was intended to adopt existing industrydeveloped standards for digital signature schemes and elliptic curves. Algorithm and curve specifications were written to accommodate users of the existing standard, while still being readable to those following the industry standards. To further improve readability, organization, and maintainability of the standard, the elliptic curves and supporting mathematical algorithm descriptions were separated into their own Special Publication supporting FIPS 186–5, and editorial changes were incorporated to improve clarity. Both documents include descriptions of the security properties provided by the new signature algorithms and elliptic curves. 3. Comment: One commenter requested that NIST clarify why DSA may be used to verify signatures generated prior to FIPS 186–5 if verifiers do not know when a signature was generated. Response: Since DSA is no longer included in the FIPS, a discussion of its use is not appropriate in the FIPS. Instead, continued use of DSA for verifying already-generated signatures (e.g., in existing data records) will be addressed in a revision to NIST SP 800– 131A, Transitioning the Use of Cryptographic Algorithms and Key Lengths. Accordingly, the statement in Appendix E of the draft FIPS that mentioned DSA signature verification was removed. In 2009, NIST SP 800– 102, Recommendation for Digital Signature Timeliness, was published to provide guidance on providing information on the time when digital signatures are generated. This publication was referenced in FIPS 186– 3, FIPS 186–4, and in FIPS 186–5. 4. Comment: One commenter recommended that EdDSA be used in preference to HashEdDSA except in applications that cannot afford EdDSA. Response: NIST specified both EdDSA and HashEdDSA in FIPS 186–5 to allow E:\FR\FM\03FEN1.SGM 03FEN1 lotter on DSK11XQN23PROD with NOTICES1 7412 Federal Register / Vol. 88, No. 23 / Friday, February 3, 2023 / Notices implementers to choose an appropriate signature algorithm for their applications and use cases. Section 7.8.3 of FIPS 186–5 provides additional considerations for implementers when selecting a signature algorithm. 5. Comment: One commenter noted that it was difficult to compare Draft FIPS 186–5 against FIPS 186–4 and recommended that NIST adopt editing tools to aid readers in locating and evaluating changes across revisions. Response: Revisions made during the development of FIPS 186–5 have been documented or summarized using a variety of methods, including the revision list in FIPS 186–5, in Federal Register notices, and in document announcements. The availability of electronic documents on the NIST Computer Security Resource Center website allows individuals to use thirdparty tools to compare revisions. However, NIST will continue to evaluate new document development and management tools to provide greater transparency to changes in cryptographic standards and guidelines. 6. Comment: A commenter noted that implementations of the RSASSA–PSS algorithm, approved by reference to RFC 8017 in FIPS 186–5, should validate the length of the salt when verifying signatures. Response: Existing guidance in Section 5.4 of FIPS 186–4 provided criteria for validating the length of the random salt value. FIPS 186–5 strengthened that language by including explicit validation of the length of the salt as part of the digital signature verification process. 7. Comment: A commenter noted that implementations of the RSASSA– PKCS–v1.5 algorithm should validate the encoded hash algorithm identifier extracted from a digital signature. Response: NIST revised Section 5.4 to include the validation of the hash algorithm identifier as part of the RSASSA–PKCS–v1.5 signature verification process. 8. Comment: Some commenters requested clarifications on the use of Montgomery and Edwards curves with approved signature and key-agreement schemes. Response: The introductions in FIPS 186–5 and NIST SP 800–186 were revised to clarify acceptable uses of recommended elliptic curves. 9. Comment: One commenter observed that different notation is used in the specifications of the ECDSA and EdDSA. Response: The notation was selected for consistency with existing standards that specify the algorithms. The notation used for ECDSA is consistent with that VerDate Sep<11>2014 17:51 Feb 02, 2023 Jkt 259001 used in FIPS 186–4 and the original ANS X9.62 standard used as a basis for the inclusion of ECDSA in FIPS 186. The notation used for EdDSA is consistent with the notation used in the original RFC 8032 specification. 10. Comment: Two commenters requested a transition plan for the removal of DSA and the deprecation of the binary elliptic curves that had been approved in FIPS 186–4. One commenter requested that DSA not be removed. Response: FIPS 186–5 removes DSA as an approved digital signature algorithm due to a lack of use by industry and based on academic analyses that observed that implementations of DSA may be vulnerable to attacks if domain parameters are not properly generated. To facilitate a transition to the new standard, FIPS 186–4 will remain in effect alongside FIPS 186–5 for a period of one year. In addition, NIST SP 800– 131A and the Cryptographic Module Validation Program will provide transition guidance concerning the use of DSA and the binary elliptic curves. 11. Comment: Commenters requested that the secp256k1 curve be included as an approved elliptic curve since it is widely used in blockchain and Distributed Ledger Technology (DLT) applications. Response: While NIST does not believe that the secp256k1 curve offers compelling advantages over the NISTrecommended curves in SP 800–186, NIST acknowledges the significant use of the secp256k1 curve in these applications. NIST technical guidelines in NIST SP 800–186 will allow the use of the secp256k1 curve for blockchain and DLT-related applications. 12. Comment: One commenter expressed concerns and posed questions about the inclusion of the Brainpool Standard Curves as a set of allowed curves in the NIST SP 800–186 technical guidelines associated with FIPS 186–5. Response: The Brainpool Standard Curves were originally published in 2005 and specified in RFC 5639 in 2010. The curves have been widely implemented in a variety of commercial products and open-source tools. Existing programmatic guidance from NIST’s Cryptographic Module Validation Program has allowed the use of these curves in several FIPS 140validated modules. While NIST does not see compelling reasons to prefer the use of the Brainpool Standard Curves over the NIST-recommended curves, it is confident in the security supported by these curves and does not see a reason to require these curves to be removed or PO 00000 Frm 00019 Fmt 4703 Sfmt 4703 disabled in existing products. To accommodate those existing modules as well as future products sold on the international market, NIST SP 800–186 will allow the use of the Brainpool Standard Curves. 13. Comment: Some commenters requested the inclusion of cofactorless EdDSA in FIPS 186–5 for signature verification. Response: NIST did not see sufficient demand or need to facilitate the use of other elliptic curves with EdDSA to warrant inclusion of cofactorless EdDSA in FIPS 186–5. To remain consistent with RFC 8032, NIST is not extending the specification of EdDSA to include these alternative domain parameters. 14. Comment: One commenter recommended adding a small-subgroup check to EdDSA or adding a warning about not providing strong nonrepudiation guarantees. Response: When signing keys are generated according to the requirements in FIPS 186–5, the probability that the signing key would be a member of a small subgroup is negligible. Thus, NIST did not see a need to add a smallsubgroup check to EdDSA. 15. Comment: Several commentors requested the inclusion of variants of the deterministic signature scheme that would include randomness in the signature computation. Response: NIST may consider adopting new standards developed for signature algorithms that include deterministic and random components in future publications. 16. Comment: Comments recommended discussing side-channel attacks for ECDSA. Response: FIPS 186–5 provides references that describe protections against side-channel attacks for both ECDSA and EdDSA. 17. Comment: A comment requested that more hash functions or extendable output functions (XOFs) be allowed for EdDSA. Response: To remain consistent with existing standards and specifications, FIPS 186–5 does not specify other hash functions or XOFs for use with EdDSA beyond those specified in RFC 8032. 18. Comment: Several commenters requested that NIST allow more hash functions or XOFs for use with ECDSA, specifically the keccak–256 XOF. Response: NIST is not allowing other hash functions or XOFs with ECDSA; keccak–256 is not an approved hash function as defined in FIPS 180 or FIPS 202. 19. Comment: One commenter asked why the bounds on the number of iterations to run through before returning a failure indication changed in E:\FR\FM\03FEN1.SGM 03FEN1 lotter on DSK11XQN23PROD with NOTICES1 Federal Register / Vol. 88, No. 23 / Friday, February 3, 2023 / Notices a few prime number generation routines in FIPS 186–5. Specifically, the bounds were changed in steps 4.7 and 5.8 of Appendix A.1.3, Generation of Random Primes that are Probably Prime, as well as in step 9 of Appendix B.9, Compute a Probably Prime Factor Based on Auxiliary Primes. Response: NIST had observed that the original bounds led to higher probabilities of failure than desired when attempting to generate primes. The bounds were increased to decrease the probability of failure. 20. Comment: One commenter suggested simplifying the deterministic version of ECDSA. Response: To remain consistent with RFC 6979, NIST will keep the deterministic version of ECDSA as currently specified. 21. Comment: One commenter recommended removing signature algorithms that are not deterministic. Response: NIST believes that both deterministic and non-deterministic signature schemes serve important use cases and so will keep the specified algorithms as they are. 22. Comment: The removal of RSASSA–PKCS–v1.5 as an approved digital signature algorithm was recommended by one commenter. Response: Due to its broad use in security protocols and products, FIPS 186–5 continues to approve the use of RSASSA–PKCS–v1.5, subject to the additional constraints specified in FIPS 186–5 to mitigate known security vulnerabilities. 23. Comment: Corrections were recommended for defining encodings for EdDSA. Response: NIST accepted the corrections. 24. Comment: A correction in A.3.3 was recommended so that FIPS 186–5 matches RFC 6979 for the per-message secret number generation for deterministic ECDSA. Response: NIST accepted the correction. 25. Comment: A few commenters suggested alternate algorithms in FIPS 186–5 to replace the reference algorithms provided by NIST for various computations. For example, commenters suggested alternatives to the square root algorithm for EdDSA in Section 7.3, the square checking algorithm in Appendix B.4, and the algorithm for inverting a finite field element in Appendix B.1. Response: FIPS 186–5 includes language to clarify that alternate algorithms (including constant-time algorithms) that produce equivalent results may be used in place of the VerDate Sep<11>2014 17:51 Feb 02, 2023 Jkt 259001 7413 reference algorithms provided in the FIPS. 26. Comment: A comment was submitted on a difference between EdDSA and the other signature schemes in FIPS 186–5. Namely, that revealing the hash of a private key for EdDSA is a security concern, while it is not for RSA or ECDSA. Response: NIST does not believe the concern merits changing EdDSA, and will maintain consistency with RFC 6979. Furthermore, FIPS 186–5 forbids revealing the hash of the private key of any of the signature algorithms. Standard Time (SST) unless otherwise indicated on the agenda. Public comment periods will be provided in the agenda. The order in which agenda items are addressed may change. The closed session is for the panel reviewers to conduct their deliberations and to consolidate their recommendations. The meetings will run as late as necessary to complete scheduled business. (Authority: 15 U.S.C. 278g–3; 40 U.S.C. 11331) 1. Welcome and Introductions 2. Objectives and Terms of Reference 3. Overview of Previous Stock Assessments and Management Framework 4. Fishery Operations for Bottomfish 5. Report out on Data Workshops 6. Data sources utilized in American Samoa Bottomfish Assessment 7. Public Comment Alicia Chambers, NIST Executive Secretariat. [FR Doc. 2023–02273 Filed 2–2–23; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE Agenda for the Western Pacific Stock Assessment Review Meeting Day 1—Friday, February 17, 2023, 10 a.m.–5 p.m. National Oceanic and Atmospheric Administration Day 2—Saturday, February 18, 2023, 9 a.m.–5 p.m. [RTID 0648–XC737] 8. Presentation and Review of Stock Assessment Methods and Results 9. WPSAR Review Panel Discussion and Model Run Requests 10. Public Comment Western Pacific Fishery Management Council; Public Meetings National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice of a public meeting. AGENCY: Day 3—Sunday, February 19, 2023, 9 a.m.–5 p.m. 11. WPSAR Review Panel Discussion with Presenters The Western Pacific Fishery Management Council (Council) and NMFS will convene a Western Pacific Stock Assessment Review (WPSAR) on a benchmark stock assessment of American Samoa Bottomfish Management Unit Species (BMUS). DATES: The WPSAR meeting will be held between February 17 and February 23, 2023. For specific times and agendas, see SUPPLEMENTARY INFORMATION. Day 4—Monday, February 20, 2023, 9 a.m.–5 p.m. The meeting will be open to the public and held in-person at the Tradewinds Hotel in Pago Pago, American Samoa located at M779+HP9, Tafuna, Western District 96799, American Samoa. For more information on meeting location and logistics, contact the Council office at (808) 522– 8220. FOR FURTHER INFORMATION CONTACT: Kitty M. Simonds, Executive Director, Western Pacific Fishery Management Council; telephone: (808) 522–8220. SUPPLEMENTARY INFORMATION: The WPSAR meeting will be held on February 17 to 23, 2023, and run each day from 9 a.m. to 5 p.m. Samoa 14. WPSAR Review Panel Discussions with Presenters 15. WPSAR Review Panel Discussions (closed, afternoon) SUMMARY: ADDRESSES: PO 00000 Frm 00020 Fmt 4703 Sfmt 4703 12. WPSAR Review Panel Discussion with Presenters Day 5—Tuesday, February 21, 2023, 9 a.m.–5 p.m. 13. WPSAR Review Panel Discussions with Presenters Day 6—Wednesday, February 22, 2023, 9 a.m.–5 p.m. Day 7—Thursday, February 23, 2023, 9 a.m.–5 p.m. 16. WPSAR Review Panel Discussions 17. Public Comment 18. WPSAR Panel Report on Review Outcomes and Recommendations 19. Adjourn Special Accommodations These meetings are physically accessible to people with disabilities. Requests for sign language interpretation or other auxiliary aids E:\FR\FM\03FEN1.SGM 03FEN1

Agencies

[Federal Register Volume 88, Number 23 (Friday, February 3, 2023)]
[Notices]
[Pages 7410-7413]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-02273]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No. 220923-0199]


Announcing Issuance of Federal Information Processing Standard 
(FIPS) 186-5, Digital Signature Standard

AGENCY: National Institute of Standards and Technology (NIST), 
Commerce.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: This notice announces the Secretary of Commerce's approval of 
Federal Information Processing Standard (FIPS) 186-5, Digital Signature 
Standard (DSS). FIPS 186-5 specifies three techniques for the 
generation and verification of digital signatures that can be used for 
the protection of data: the Rivest-Shamir-Adleman (RSA) Algorithm, the 
Elliptic Curve Digital Signature Algorithm (ECDSA), and the Edwards 
Curve Digital Signature Algorithm (EdDSA). The Digital Signature 
Algorithm (DSA), specified in prior versions of this standard, is 
retained only for the purposes of verifying existing signatures.

DATES: FIPS 186-5 is effective on February 3, 2023.

ADDRESSES: FIPS 186-5 is available electronically on the NIST Computer 
Security Resource Center website at https://csrc.nist.gov. Comments 
that were received on the proposed changes are published electronically 
at https://csrc.nist.gov/publications/detail/fips/186/5/draft and at 
https://www.regulations.gov.

FOR FURTHER INFORMATION CONTACT: Dr. Dustin Moody, National Institute 
of Standards and Technology, 100 Bureau Drive, Mail Stop 8930, 
Gaithersburg, MD 20899-8930, email: [email protected], phone: (301) 
975-8136.

SUPPLEMENTARY INFORMATION: FIPS 186 was initially developed by NIST in

[[Page 7411]]

collaboration with the National Security Agency (NSA), using the NSA-
designed Digital Signature Algorithm (DSA). Later versions of the 
standard approved the use of ECDSA (developed by Certicom) and RSA 
(developed by Ron Rivest, Adi Shamir and Leonard Adleman). American 
Standards Committee (ASC) X9 developed standards specifying both ECDSA 
and RSA that were used as the basis for the later revisions of FIPS 
186.
    Since its original approval on May 10, 1994 (59 FR 26208), 
revisions of the FIPS were approved on December 15, 1998 as FIPS 186-1 
(63 FR 69049) to include RSA, as specified in American National 
Standard (ANS) X9.31 (Digital Signatures Using Reversible Public Key 
Cryptography for the Financial Services Industry (rDSA)), and on 
February 15, 2000 as FIPS 186-2 (65 FR 7507) to include ECDSA and 
recommended elliptic curves to be used with ECDSA, as specified in ANS 
X9.62 (Elliptic Curve Digital Signature Algorithm (ECDSA)). On June 9, 
2009, a third revision of the FIPS was approved as FIPS 186-3 (74 FR 
27287) to (1) increase the key sizes for DSA, (2) provide additional 
requirements for the use of RSA and ECDSA, (3) allow the use of the RSA 
algorithm specified in Public Key Cryptography Standard (PKCS) #1 (RSA 
Cryptography Standard specified in Institute of Electrical and 
Electronics Engineers (IEEE) P1363, Standard Specifications for Public 
Key Cryptography), (4) include requirements for obtaining the 
assurances necessary for valid digital signatures, and (5) replace the 
random number generators specified in previous versions of the FIPS 
with a reference to NIST Special Publication (SP) 800-90 
(Recommendation for Random Number Generation Using Deterministic Random 
Bit Generators). A fourth revision of the FIPS was approved as FIPS 
186-4 (78 FR 43145) on July 19, 2013, which included (1) a reduction of 
the restrictions on the use of random number generators and the 
retention and use of prime number generation seeds, and (2) aligning 
the specification for the use of a random salt value in the RSASSA-PSS 
digital signature scheme with PKCS #1.
    Advances in the understanding of elliptic curves within the 
cryptographic community have led to the development of new elliptic 
curves and algorithms whose designers claim to offer better performance 
and which are easier to implement in a secure manner. In 2014, NIST's 
Visiting Committee on Advanced Technology (VCAT) conducted a review of 
NIST's cryptographic standards program. As part of their review, the 
VCAT recommended that NIST ``generate a new set of elliptic curves for 
use with ECDSA in FIPS 186.'' See https://www.nist.gov/sites/default/files/documents/2017/05/09/VCAT-Report-on-NIST-Cryptographic-Standards-and-Guidelines-Process.pdf.
    In June 2015, NIST hosted a technical workshop on Elliptic Curve 
Cryptography Standards to discuss possible approaches to promote the 
adoption of secure, interoperable, and efficient elliptic curve 
mechanisms. Workshop participants expressed significant interest in the 
development, standardization, and adoption of new elliptic curves.
    In October 2015, NIST solicited comments on the elliptic curves and 
signature algorithms specified in FIPS 186-4 (80 FR 63539). The 
responses noted the broad use of the NIST prime curves and ECDSA within 
industry, but many commenters called for the standardization of new 
elliptic curves and signature algorithms.
    Based on the input received, NIST published a notice in the Federal 
Register (84 FR 58373) on October 31, 2019, requesting public comments 
on the proposed revision in draft FIPS 186-5, along with accompanying 
technical guidelines in draft NIST Special Publication (SP) 800-186, 
Recommendations for Discrete-Logarithm Based Cryptography: Elliptic 
Curve Domain Parameters. NIST received 23 sets of comments: 3 from U.S. 
federal agencies, 1 from a foreign government agency, 16 from private-
sector organizations, and 3 from private academics and technologists.
    The draft of FIPS 186-5 and the related technical guidelines in 
draft NIST SP 800-186 proposed adopting two new elliptic curves, 
Ed25519 and Ed448, for use with EdDSA. EdDSA is a deterministic 
elliptic curve signature scheme currently specified in the internet 
Research Task Force (IRTF) RFC 8032. FIPS 186-5 and SP 800-186 also 
proposed adopting a deterministic variant of ECDSA that is currently 
specified in RFC 6979. Based on feedback received on the adoption of 
the current elliptic curve standards, the drafts of FIPS 186-5 and SP 
800-186 deprecated curves over binary fields due to their limited use 
by industry. Furthermore, NIST proposed the removal of DSA from the 
FIPS as an approved method for generating digital signatures because of 
limited use by industry and academic analyses finding that 
implementations of DSA may be vulnerable to attacks.
    The following is a summary and analysis of the comments received 
during the public comment period and NIST's responses to them, 
including the interests, concerns, recommendations, and issues 
considered in the development of FIPS 186-5:
    1. Comment: One commenter requested that FIPS 186-5 include an 
additional digital signature scheme using elliptic curve cryptography, 
Schnorr 384, in order to support signatures with short lengths.
    Response: NIST does not see a broad demand or need for the Schnorr 
384 signature scheme and declined to include it in FIPS 186-5.
    2. Comment: One commenter requested that the standard be simplified 
and revised to highlight security tradeoffs of design choices.
    Response: The FIPS 186-5 revision was intended to adopt existing 
industry-developed standards for digital signature schemes and elliptic 
curves. Algorithm and curve specifications were written to accommodate 
users of the existing standard, while still being readable to those 
following the industry standards. To further improve readability, 
organization, and maintainability of the standard, the elliptic curves 
and supporting mathematical algorithm descriptions were separated into 
their own Special Publication supporting FIPS 186-5, and editorial 
changes were incorporated to improve clarity. Both documents include 
descriptions of the security properties provided by the new signature 
algorithms and elliptic curves.
    3. Comment: One commenter requested that NIST clarify why DSA may 
be used to verify signatures generated prior to FIPS 186-5 if verifiers 
do not know when a signature was generated.
    Response: Since DSA is no longer included in the FIPS, a discussion 
of its use is not appropriate in the FIPS. Instead, continued use of 
DSA for verifying already-generated signatures (e.g., in existing data 
records) will be addressed in a revision to NIST SP 800-131A, 
Transitioning the Use of Cryptographic Algorithms and Key Lengths. 
Accordingly, the statement in Appendix E of the draft FIPS that 
mentioned DSA signature verification was removed. In 2009, NIST SP 800-
102, Recommendation for Digital Signature Timeliness, was published to 
provide guidance on providing information on the time when digital 
signatures are generated. This publication was referenced in FIPS 186-
3, FIPS 186-4, and in FIPS 186-5.
    4. Comment: One commenter recommended that EdDSA be used in 
preference to HashEdDSA except in applications that cannot afford 
EdDSA.
    Response: NIST specified both EdDSA and HashEdDSA in FIPS 186-5 to 
allow

[[Page 7412]]

implementers to choose an appropriate signature algorithm for their 
applications and use cases. Section 7.8.3 of FIPS 186-5 provides 
additional considerations for implementers when selecting a signature 
algorithm.
    5. Comment: One commenter noted that it was difficult to compare 
Draft FIPS 186-5 against FIPS 186-4 and recommended that NIST adopt 
editing tools to aid readers in locating and evaluating changes across 
revisions.
    Response: Revisions made during the development of FIPS 186-5 have 
been documented or summarized using a variety of methods, including the 
revision list in FIPS 186-5, in Federal Register notices, and in 
document announcements. The availability of electronic documents on the 
NIST Computer Security Resource Center website allows individuals to 
use third-party tools to compare revisions. However, NIST will continue 
to evaluate new document development and management tools to provide 
greater transparency to changes in cryptographic standards and 
guidelines.
    6. Comment: A commenter noted that implementations of the RSASSA-
PSS algorithm, approved by reference to RFC 8017 in FIPS 186-5, should 
validate the length of the salt when verifying signatures.
    Response: Existing guidance in Section 5.4 of FIPS 186-4 provided 
criteria for validating the length of the random salt value. FIPS 186-5 
strengthened that language by including explicit validation of the 
length of the salt as part of the digital signature verification 
process.
    7. Comment: A commenter noted that implementations of the RSASSA-
PKCS-v1.5 algorithm should validate the encoded hash algorithm 
identifier extracted from a digital signature.
    Response: NIST revised Section 5.4 to include the validation of the 
hash algorithm identifier as part of the RSASSA-PKCS-v1.5 signature 
verification process.
    8. Comment: Some commenters requested clarifications on the use of 
Montgomery and Edwards curves with approved signature and key-agreement 
schemes.
    Response: The introductions in FIPS 186-5 and NIST SP 800-186 were 
revised to clarify acceptable uses of recommended elliptic curves.
    9. Comment: One commenter observed that different notation is used 
in the specifications of the ECDSA and EdDSA.
    Response: The notation was selected for consistency with existing 
standards that specify the algorithms. The notation used for ECDSA is 
consistent with that used in FIPS 186-4 and the original ANS X9.62 
standard used as a basis for the inclusion of ECDSA in FIPS 186. The 
notation used for EdDSA is consistent with the notation used in the 
original RFC 8032 specification.
    10. Comment: Two commenters requested a transition plan for the 
removal of DSA and the deprecation of the binary elliptic curves that 
had been approved in FIPS 186-4. One commenter requested that DSA not 
be removed.
    Response: FIPS 186-5 removes DSA as an approved digital signature 
algorithm due to a lack of use by industry and based on academic 
analyses that observed that implementations of DSA may be vulnerable to 
attacks if domain parameters are not properly generated. To facilitate 
a transition to the new standard, FIPS 186-4 will remain in effect 
alongside FIPS 186-5 for a period of one year. In addition, NIST SP 
800-131A and the Cryptographic Module Validation Program will provide 
transition guidance concerning the use of DSA and the binary elliptic 
curves.
    11. Comment: Commenters requested that the secp256k1 curve be 
included as an approved elliptic curve since it is widely used in 
blockchain and Distributed Ledger Technology (DLT) applications.
    Response: While NIST does not believe that the secp256k1 curve 
offers compelling advantages over the NIST-recommended curves in SP 
800-186, NIST acknowledges the significant use of the secp256k1 curve 
in these applications. NIST technical guidelines in NIST SP 800-186 
will allow the use of the secp256k1 curve for blockchain and DLT-
related applications.
    12. Comment: One commenter expressed concerns and posed questions 
about the inclusion of the Brainpool Standard Curves as a set of 
allowed curves in the NIST SP 800-186 technical guidelines associated 
with FIPS 186-5.
    Response: The Brainpool Standard Curves were originally published 
in 2005 and specified in RFC 5639 in 2010. The curves have been widely 
implemented in a variety of commercial products and open-source tools. 
Existing programmatic guidance from NIST's Cryptographic Module 
Validation Program has allowed the use of these curves in several FIPS 
140-validated modules. While NIST does not see compelling reasons to 
prefer the use of the Brainpool Standard Curves over the NIST-
recommended curves, it is confident in the security supported by these 
curves and does not see a reason to require these curves to be removed 
or disabled in existing products. To accommodate those existing modules 
as well as future products sold on the international market, NIST SP 
800-186 will allow the use of the Brainpool Standard Curves.
    13. Comment: Some commenters requested the inclusion of 
cofactorless EdDSA in FIPS 186-5 for signature verification.
    Response: NIST did not see sufficient demand or need to facilitate 
the use of other elliptic curves with EdDSA to warrant inclusion of 
cofactorless EdDSA in FIPS 186-5. To remain consistent with RFC 8032, 
NIST is not extending the specification of EdDSA to include these 
alternative domain parameters.
    14. Comment: One commenter recommended adding a small-subgroup 
check to EdDSA or adding a warning about not providing strong non-
repudiation guarantees.
    Response: When signing keys are generated according to the 
requirements in FIPS 186-5, the probability that the signing key would 
be a member of a small subgroup is negligible. Thus, NIST did not see a 
need to add a small-subgroup check to EdDSA.
    15. Comment: Several commentors requested the inclusion of variants 
of the deterministic signature scheme that would include randomness in 
the signature computation.
    Response: NIST may consider adopting new standards developed for 
signature algorithms that include deterministic and random components 
in future publications.
    16. Comment: Comments recommended discussing side-channel attacks 
for ECDSA.
    Response: FIPS 186-5 provides references that describe protections 
against side-channel attacks for both ECDSA and EdDSA.
    17. Comment: A comment requested that more hash functions or 
extendable output functions (XOFs) be allowed for EdDSA.
    Response: To remain consistent with existing standards and 
specifications, FIPS 186-5 does not specify other hash functions or 
XOFs for use with EdDSA beyond those specified in RFC 8032.
    18. Comment: Several commenters requested that NIST allow more hash 
functions or XOFs for use with ECDSA, specifically the keccak-256 XOF.
    Response: NIST is not allowing other hash functions or XOFs with 
ECDSA; keccak-256 is not an approved hash function as defined in FIPS 
180 or FIPS 202.
    19. Comment: One commenter asked why the bounds on the number of 
iterations to run through before returning a failure indication changed 
in

[[Page 7413]]

a few prime number generation routines in FIPS 186-5. Specifically, the 
bounds were changed in steps 4.7 and 5.8 of Appendix A.1.3, Generation 
of Random Primes that are Probably Prime, as well as in step 9 of 
Appendix B.9, Compute a Probably Prime Factor Based on Auxiliary 
Primes.
    Response: NIST had observed that the original bounds led to higher 
probabilities of failure than desired when attempting to generate 
primes. The bounds were increased to decrease the probability of 
failure.
    20. Comment: One commenter suggested simplifying the deterministic 
version of ECDSA.
    Response: To remain consistent with RFC 6979, NIST will keep the 
deterministic version of ECDSA as currently specified.
    21. Comment: One commenter recommended removing signature 
algorithms that are not deterministic.
    Response: NIST believes that both deterministic and non-
deterministic signature schemes serve important use cases and so will 
keep the specified algorithms as they are.
    22. Comment: The removal of RSASSA-PKCS-v1.5 as an approved digital 
signature algorithm was recommended by one commenter.
    Response: Due to its broad use in security protocols and products, 
FIPS 186-5 continues to approve the use of RSASSA-PKCS-v1.5, subject to 
the additional constraints specified in FIPS 186-5 to mitigate known 
security vulnerabilities.
    23. Comment: Corrections were recommended for defining encodings 
for EdDSA.
    Response: NIST accepted the corrections.
    24. Comment: A correction in A.3.3 was recommended so that FIPS 
186-5 matches RFC 6979 for the per-message secret number generation for 
deterministic ECDSA.
    Response: NIST accepted the correction.
    25. Comment: A few commenters suggested alternate algorithms in 
FIPS 186-5 to replace the reference algorithms provided by NIST for 
various computations. For example, commenters suggested alternatives to 
the square root algorithm for EdDSA in Section 7.3, the square checking 
algorithm in Appendix B.4, and the algorithm for inverting a finite 
field element in Appendix B.1.
    Response: FIPS 186-5 includes language to clarify that alternate 
algorithms (including constant-time algorithms) that produce equivalent 
results may be used in place of the reference algorithms provided in 
the FIPS.
    26. Comment: A comment was submitted on a difference between EdDSA 
and the other signature schemes in FIPS 186-5. Namely, that revealing 
the hash of a private key for EdDSA is a security concern, while it is 
not for RSA or ECDSA.
    Response: NIST does not believe the concern merits changing EdDSA, 
and will maintain consistency with RFC 6979. Furthermore, FIPS 186-5 
forbids revealing the hash of the private key of any of the signature 
algorithms.

(Authority: 15 U.S.C. 278g-3; 40 U.S.C. 11331)

Alicia Chambers,
NIST Executive Secretariat.
[FR Doc. 2023-02273 Filed 2-2-23; 8:45 am]
BILLING CODE 3510-13-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.