[17218] in cryptography@c2.net mail archive
Three NIST Special Pubs for Review (Forwarded)
daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Fri May 20 15:13:56 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: cryptography@metzdowd.com
Date: Thu, 21 Apr 2005 13:49:23 -0400
------- Forwarded Message
Date: Thu, 21 Apr 2005 13:29:28 -0400
To: Morris.Dworkin@nist.gov
From: Elaine Barker <elaine.barker@nist.gov>
Subject: Three NIST Special Pubs for Review
There are three NIST Special Publications available for public review and=
=
comment:
SP 800-38B:
As part of NIST's ongoing effort to update and develop modes of operation=
=
for use with the AES algorithm, NIST intends to recommend either the Galo=
is =
Counter Mode (GCM) or the Carter-Wegman + Counter (CWC) mode. GCM and CWC=
=
are modes for authenticated encryption with associated data, combining =
Counter mode confidentiality with authentication that is based on a =
universal hash algorithm. Both GCM and CWC are parallelizable. The =
submission documents specifying GCM and CWC are available through the mod=
es =
home page, <http://nist.gov/modes>http://nist.gov/modes. NIST invites =
comments on these two modes, including comments on intellectual property =
matters, by June 1, 2005, at =
<mailto:encryptionmodes@nist.gov>EncryptionModes@nist.gov.
SP 800-57, Parts 1 and 2:
Drafts of NIST Special Publication 800-57 Recommendation for Key =
Management, Parts 1 and 2 are available for public comment at =
<http://csrc.nist.gov/publications/drafts.html>http://csrc.nist.gov/publi=
cations/drafts.html. =
This Recommendation provides cryptographic key management guidance.
Part 1 provides guidance and best practices for the management of =
cryptographic keying material. Comments will be accepted on Part 1 until =
June 3, 2005. Please send comments to =
<mailto:Key_mgmt@nist.gov>Key_mgmt@nist.gov, with "Comments on SP 800-57,=
=
Part 1" in the subject line.
Part 2 provides guidance on policy and security planning requirements for=
=
U.S. government agencies. Reviewers of Part 2 should note that a number o=
f =
the security planning documents referenced in this part of SP 800-57 are =
undergoing review and revision. It is anticipated that Part 2 will be =
updated to reflect these revisions. Comments will be accepted on Part 2 =
until May 18, 2005. Please send comments to =
<mailto:Key_mgmt@nist.gov>Key_mgmt@nist.gov, with "Comments on SP 800-57,=
=
Part 2" in the subject line.
Elaine Barker
100 Bureau Drive, Stop 8930
Gaithersburg, MD 20899
Phone: 301-975-2911 =
--Prof. Steven M. Bellovin, http://www.cs.columbia.edu/~smb
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com