Committed to connecting the world

  •  
wtisd

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : H.810     
  ITU-T A.5 justification information for referenced document FIPS PUB 180-4 (2012) in draft H.810
1. Clear description of the referenced document:
Name: FIPS PUB 180-4 (2012)
Title: Secure Hash Standard (SHS)
2. Status of approval:
Federal Information Processing Standard (FIPS) approved 2012-03.
3. Justification for the specific reference:
Secure Hash technology is used for security of communications within the ITU-T H.810 Architecture. It is an update of FIPS PUB 180-2 referenced in earlier editions of the COtinua Design Guidelines.
4. Current information, if any, about IPR issues:
Some information may be available in the NIST Patents Database that can be accessed through http://patapsco.nist.gov/ts/220/sharedpatent/index.cfm
5. Other useful information describing the "Quality" of the document:
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated. This NIST document has been produced by Computer Security Division's (CSD) Security Technology Group of NIST has a subgroup that deals specifically with Cryptographic Technology Standards and Guidance (CTSG). CTSG is involved in the development, maintenance, and promotion of a number of standards and guidance that cover a wide range of cryptographic technology. NIST has long term technical experience in dealing with cryptographic matters. The document has been publicly and internally reviewed before publication.
6. The degree of stability or maturity of the document:
Published in March 2012. This Standard supersedes FIPS 180-3, which had already superseded FIPS 180-2. For the relationship between FIPS 180-4 and FIPS 140-2, see IG 1.10 of the Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program at http://csrc.nist.gov/groups/STM/cmvp.
7. Relationship with other existing or emerging documents:
NIST is actively involved in standardization of cryptographic techniques. The crypto tools are of wide general applicability (see e.g. DES, AES, modes of operation and guidelines). NIST continues its research and standardization in the area of modes of operation. Guidance regarding the testing and validation to FIPS 180-4 and its relationship to FIPS 140-2 can be found in IG 1.10 of the Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program at http://csrc.nist.gov/groups/STM/cmvp.
8. Any explicit references within that referenced document should also be listed:
APPENDIX B: REFERENCES/
[FIPS 180-3] NIST, Federal Information Processing Standards Publication 180-3, Secure Hash Standards (SHS) , October 2008. /
[SP 800-57] NIST Special Publication (SP) 800-57, Part 1, Recommendation for Key Management: General , (Draft) May 2011. /
[SP 800-107] NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms , (Revised), (Draft) September 2011.
9. Qualification of NIST:
Qualification of NIST: NIST is recognized under the provisions of ITU-T Recommendation A.5. Qualifying information is on file in TSB.
10. Other (for any supplementary information):
N/A
Note: This form is based on Recommendation ITU-T A.5