Three NIST Special Pubs for Review (Forwarded)
Steven M. Bellovin
smb at cs.columbia.edu
Thu Apr 21 13:49:23 EDT 2005
------- Forwarded Message
Date: Thu, 21 Apr 2005 13:29:28 -0400
To: Morris.Dworkin at nist.gov
From: Elaine Barker <elaine.barker at nist.gov>
Subject: Three NIST Special Pubs for Review
There are three NIST Special Publications available for public review and
comment:
SP 800-38B:
As part of NIST's ongoing effort to update and develop modes of operation
for use with the AES algorithm, NIST intends to recommend either the Galois
Counter Mode (GCM) or the Carter-Wegman + Counter (CWC) mode. GCM and CWC
are modes for authenticated encryption with associated data, combining
Counter mode confidentiality with authentication that is based on a
universal hash algorithm. Both GCM and CWC are parallelizable. The
submission documents specifying GCM and CWC are available through the modes
home page, <http://nist.gov/modes>http://nist.gov/modes. NIST invites
comments on these two modes, including comments on intellectual property
matters, by June 1, 2005, at
<mailto:encryptionmodes at nist.gov>EncryptionModes at nist.gov.
SP 800-57, Parts 1 and 2:
Drafts of NIST Special Publication 800-57 Recommendation for Key
Management, Parts 1 and 2 are available for public comment at
<http://csrc.nist.gov/publications/drafts.html>http://csrc.nist.gov/publications/drafts.html.
This Recommendation provides cryptographic key management guidance.
Part 1 provides guidance and best practices for the management of
cryptographic keying material. Comments will be accepted on Part 1 until
June 3, 2005. Please send comments to
<mailto:Key_mgmt at nist.gov>Key_mgmt at nist.gov, with "Comments on SP 800-57,
Part 1" in the subject line.
Part 2 provides guidance on policy and security planning requirements for
U.S. government agencies. Reviewers of Part 2 should note that a number of
the security planning documents referenced in this part of SP 800-57 are
undergoing review and revision. It is anticipated that Part 2 will be
updated to reflect these revisions. Comments will be accepted on Part 2
until May 18, 2005. Please send comments to
<mailto:Key_mgmt at nist.gov>Key_mgmt at nist.gov, with "Comments on SP 800-57,
Part 2" in the subject line.
Elaine Barker
100 Bureau Drive, Stop 8930
Gaithersburg, MD 20899
Phone: 301-975-2911
--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list