|
A Cryptome DVD is offered by Cryptome. Donate $25 for a DVD of the Cryptome 11-years archives of 41,000 files from June 1996 to June 2007 (~4.4 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. |
13 June 2007
[Federal Register: June 12, 2007 (Volume 72, Number 112)]
[Notices]
[Page 32282]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr12jn07-26]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No.: 070413090-7092-01]
Announcing Draft Federal Information Processing Standard (FIPS)
Publication 180-3, the Secure Hash Standard, and Request for Comments
AGENCY: National Institute of Standards and Technology, Commerce.
ACTION: Notice and request for comments.
-----------------------------------------------------------------------
SUMMARY: This notice announces the Draft Federal Information Processing
Standard (FIPS) 180-3, Secure Hash Standard (SHS), for public review
and comment. The draft standard, designated ``Draft FIPS 180-3,'' is
proposed to supersede FIPS 180-2. FIPS 180-2, Secure Hash Standard
(SHS), August 2002, specifies secure hash algorithms (SHA) called SHA-
1, SHA-256, SHA-384 and SHA-512. These algorithms produce 160, 256,
384, and 512-bit outputs, respectively, which are called message
digests. An additional secure hash algorithm, called SHA-224, that
produces a 224-bit output, is specified in Change Notice 1 to FIPS 180-
2, which was issued in 2004. Draft FIPS 180-3 specifies five secure
hash algorithms: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. The
proposed standard is available at http://csrc.nist.gov/publications/drafts.html
.
Prior to the submission of this proposed standard to the Secretary
of Commerce for review and approval, it is essential that consideration
be given to the needs and views of the public, users, the information
technology industry, and Federal, State, and local government
organizations. The purpose of this notice is to solicit such views.
DATES: Comments must be received by September 10, 2007.
ADDRESSES: Written comments may be sent to: Chief, Computer Security
Division, Information Technology Laboratory, Attention: Comments on
Draft FIPS 180-3, 100 Bureau Drive--Stop 8930, National Institute of
Standards and Technology, Gaithersburg, MD 20899-8930. Electronic
comments may be sent to: Proposed180-3@nist.gov. The current FIPS 180-2
and its proposed replacement, Draft FIPS 180-3, are available
electronically at http://csrc.nist.gov/publications/index.html.
Comments received in response to this notice will be published
electronically at http://csrc.nist.gov/CryptoToolkit/tkhash.html.
FOR FURTHER INFORMATION CONTACT: For general information, contact:
Elaine Barker, National Institute of Standards and Technology, Stop
8930, Gaithersburg, MD 20899-8930, telephone: 301-975-2911, e-mail:
elaine.barker@nist.gov. or via fax at 301-975-8670, or Quynh Dang,
telephone: 301-975-3610, e-mail: quynh.dang@nist.gov.
SUPPLEMENTARY INFORMATION: The changes between FIPS 180-2 and FIPS 180-
3 are minor and are motivated by a desire to put informative
information that is subject to change in a less formal publication that
can be readily updated as necessary. FIPS 180-2 contained statements
about the security strengths of the hash algorithms. However, the
security strengths of the hashing algorithms, SHA-1, SHA-224, SHA-256,
SHA-384 and SHA-512, might change due to future cryptanalysis;
consequently, Draft FIPS 180-3 does not describe their security
strengths. Instead, the security strengths will be specified in NIST
Special Publications (SP) 800-57, Recommendation for Key Management,
and discussed in NIST SP 800-107, Recommendation for Using Approved
Hash Algorithms. These Special Publications will be periodically
reviewed and updated if warranted by advances in the cryptanalysis of
these hash algorithms. Examples of the implementation of these hash
algorithms can be found at http://www.nist.gov/CryptoToolkitExamples NIST Special Publications are available at: http://csrc.nist.gov/.
.
Authority: NIST activities to develop computer security
standards to protect Federal sensitive (unclassified) systems are
undertaken pursuant to specific responsibilities assigned to NIST by
section 20 of the National Institute of Standards and Technology Act
(5 U.S.C. 278g-3) as amended by section 303 of the Federal
Information Security Management Act of 2002 (Pub. L. 107-347).
Executive Order 12866: This notice has been determined not to be
significant for the purpose of Executive Order 12866.
Dated: June 5, 2007.
James M. Turner,
Deputy Director, NIST.
[FR Doc. E7-11326 Filed 6-11-07; 8:45 am]
BILLING CODE 3510-13-P