U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Guideline for Using Cryptographic Standards in the Federal Government—Cryptographic Mechanisms: NIST Releases Draft NIST SP 800-175B Rev. 1
July 03, 2019

Network and data security are essential in today's environment of increasingly open and interconnected systems, networks, and mobile devices. Critical security services include confidentiality, identity authentication, data integrity authentication, source authentication, and the support of non-repudiation. Cryptographic techniques can offer such protection for data that is sensitive, has high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage.

NIST invites comments on Draft NIST Special Publication (SP) 800-175B Revision 1, Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms, which is part of a series of documents that provides recommendations for protecting sensitive, unclassified digitized information using cryptography and NIST’s cryptographic standards. The document discusses cryptographic methods and services and refers to the recently published strategy for deprecating the Triple Data Encryption Algorithm (TDEA). Additional changes are listed in Appendix B.

A public comment period for this document is open until September 5, 2019. See the publication details for a copy of the document and instructions for submitting comments.

NOTE: A call for patent claims is included on page iii of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.

Related Topics

Security and Privacy: authentication, cryptography, public key infrastructure

Created July 03, 2019, Updated June 22, 2020