Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

SP 800-131A Rev. 2 (DRAFT)

Transitioning the Use of Cryptographic Algorithms and Key Lengths

Date Published: July 2018
Comments Due: September 7, 2018 (public comment period is CLOSED)
Email Questions to: CryptoTransitions@nist.gov

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST)

Announcement

NIST is updating its guidance for transitioning to the use of stronger cryptographic keys and more robust algorithms by federal agencies to protect sensitive, but unclassified, information. These transitions are meant to address the challenges posed by new cryptanalysis, the increasing power of classical computing technology, and the potential emergence of quantum computers.

Draft Special Publication (SP) 800-131A Revision 2, Transitioning the Use of Cryptographic Algorithms and Key Lengths, is now available for public comment. This revision includes a strategy and schedule for retiring the use of the Triple Data Encryption Algorithm (TDEA). Other proposed changes are listed in Appendix B.

Abstract

Keywords

cryptographic algorithm; digital signatures; encryption; hash function; key agreement; key derivation functions; key management; key transport; key wrapping; message authentication codes; post-quantum algorithms; random number generation; security strength; transition
Control Families

System and Information Integrity; System and Communications Protection;

Documentation

Publication:
Draft SP 800-131A Rev. 2

Supplemental Material:
None available

Related NIST Publications:
SP 800-57 Part 1 Rev. 4

Topics

Security and Privacy
cryptography