Three NIST Special Pubs for Review (Forwarded)

Steven M. Bellovin smb at cs.columbia.edu
Thu Apr 21 13:49:23 EDT 2005


------- Forwarded Message


Date: Thu, 21 Apr 2005 13:29:28 -0400
To: Morris.Dworkin at nist.gov
From: Elaine Barker <elaine.barker at nist.gov>
Subject: Three NIST Special Pubs for Review


There are three NIST Special Publications available for public review and 
comment:

SP 800-38B:
As part of NIST's ongoing effort to update and develop modes of operation 
for use with the AES algorithm, NIST intends to recommend either the Galois 
Counter Mode (GCM) or the Carter-Wegman + Counter (CWC) mode. GCM and CWC 
are modes for authenticated encryption with associated data, combining 
Counter mode confidentiality with authentication that is based on a 
universal hash algorithm. Both GCM and CWC are parallelizable. The 
submission documents specifying GCM and CWC are available through the modes 
home page, <http://nist.gov/modes>http://nist.gov/modes. NIST invites 
comments on these two modes, including comments on intellectual property 
matters, by June 1, 2005, at 
<mailto:encryptionmodes at nist.gov>EncryptionModes at nist.gov.

SP 800-57, Parts 1 and 2:
Drafts of NIST Special Publication 800-57 Recommendation for Key 
Management, Parts 1 and 2 are available for public comment at 
<http://csrc.nist.gov/publications/drafts.html>http://csrc.nist.gov/publications/drafts.html. 
This Recommendation provides cryptographic key management guidance.

Part 1 provides guidance and best practices for the management of 
cryptographic keying material. Comments will be accepted on Part 1 until 
June 3, 2005. Please send comments to 
<mailto:Key_mgmt at nist.gov>Key_mgmt at nist.gov, with "Comments on SP 800-57, 
Part 1" in the subject line.

Part 2 provides guidance on policy and security planning requirements for 
U.S. government agencies. Reviewers of Part 2 should note that a number of 
the security planning documents referenced in this part of SP 800-57 are 
undergoing review and revision. It is anticipated that Part 2 will be 
updated to reflect these revisions. Comments will be accepted on Part 2 
until May 18, 2005. Please send comments to 
<mailto:Key_mgmt at nist.gov>Key_mgmt at nist.gov, with "Comments on SP 800-57, 
Part 2" in the subject line.


Elaine Barker
100 Bureau Drive, Stop 8930
Gaithersburg, MD 20899
Phone: 301-975-2911  


		--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list