Publications
July 19, 2023: URLs for CSRC publication details pages have changed. Legacy URLs should automatically redirect to the new URLs. However, links to the actual publications have NOT changed (e.g., DOIs and PDFs on nvlpubs.nist.gov). Please send inquiries to
csrc-inquiry@nist.gov.
Further development of this draft has ceased (April 23, 2012).
Transitions: Validation of Transitioning Cryptographic Algorithm and Key Lengths
Documentation
Topics
Date Published: February 2011
Comments Due:
Email Questions to:
Planning Note (04/23/2012):
The guidance from this draft was moved to FIPS 140-1 Implementation Guidance W.14.
Author(s)
Elaine Barker (NIST), Allen Roginsky (NIST), Randall Easter (NIST), Sharon Keller (NIST)
Announcement
NIST requests comments on Draft Special Publication (SP) 800-131B, Transitions: Validation of Transitioning Cryptographic Algorithm and Key Lengths. SP 800-131B provides details about the validation of the cryptographic algorithms and cryptographic modules in transition, as specified in SP 800-131A.
At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algorithms that adequately protect sensitive information, and planning ahead for possible changes in the use of cryptography because of algorithm breaks or the availability of more powerful computing techniques. NIST Special Publication (SP) 800-57, Part 1 was the first document produced in this effort, and includes a general approach for transitioning from one algorithm or key length to another. SP 800-131A provided more specific guidance for transitions to the use of stronger cryptographic keys and more robust algorithms. This document (SP 800-131B) is intended to provide more detail about the validation of the cryptographic algorithms and cryptographic modules in transition, as specified in SP 800-131A.
At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algorithms that adequately protect sensitive...
See full abstract
At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algorithms that adequately protect sensitive information, and planning ahead for possible changes in the use of cryptography because of algorithm breaks or the availability of more powerful computing techniques. NIST Special Publication (SP) 800-57, Part 1 was the first document produced in this effort, and includes a general approach for transitioning from one algorithm or key length to another. SP 800-131A provided more specific guidance for transitions to the use of stronger cryptographic keys and more robust algorithms. This document (SP 800-131B) is intended to provide more detail about the validation of the cryptographic algorithms and cryptographic modules in transition, as specified in SP 800-131A.
Hide full abstract
Keywords
Cryptographic Module Validation Program (CMVP); Cryptographic Algorithm Validation Program (CAVP); validation testing.
Control Families
None selected