1.
|
Clear description of the referenced document:
|
|
|
2.
|
Status of approval:
|
|
Approved; Published in August 2012
|
3.
|
Justification for the specific reference:
|
|
NIST SP 800-107 Revision 1, Recommendation for Applications Using Approved Hash Algorithms, is an integral part of the authentication mechanism and thus a normative reference for J.dmcd-kl-as.
|
4.
|
Current information, if any, about IPR issues:
|
|
Some information may be available in the NIST Patents Database that can be accessed through http://patapsco.nist.gov/ts/220/sharedpatent/index.cfm
|
5.
|
Other useful information describing the "Quality" of the document:
|
|
This Recommendation has been developed by the National Institute of Standards and Technology (NIST) in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347.
NIST has long term technical experience in dealing with cryptographic matters. The document has been publicly and internally reviewed before publication.
|
6.
|
The degree of stability or maturity of the document:
|
|
Stable document since 2012.
|
7.
|
Relationship with other existing or emerging documents:
|
|
None
|
8.
|
Any explicit references within that referenced document should also be listed:
|
|
[SP 800-38B] NIST Special Publication (SP) 800-38B, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, May 2005./
[SP 800-38C] NIST Special Publication (SP) 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality, July 2007./
[SP 800-38D] NIST Special Publication (SP) 800-38D, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, November 2007./
[SP 800-56A] NIST Special Publication (SP) 800-56A, Recommendation for Pair-Wise Key Establishment/
Schemes Using Discrete Logarithm Cryptography, March 2007./
[SP 800-56B] NIST Special Publication (SP) 800-56B, Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography, August 2009./
[SP 800-56C] NIST Special Publication (SP) 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion, November 2011./
[SP 800-57] NIST Special Publication (SP) 800-57, Part 1, Recommendation for Key Management: General, (Revision 3) July 2012./
[SP 800-90A] NIST Special Publication (SP) 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, January 2012./
[SP 800-106] NIST Special Publication (SP) 800-106, Randomized Hashing for Digital Signatures, February 2009./
[SP 800-108] NIST Special Publication (SP) 800-108, Recommendation for Key Derivation Using Pseudorandom Functions, November 2008./
[SP 800-131A] E. Barker and A. Roginsky, “Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths”, NIST Special Publication 800-131A, January 2011./
[SP 800-133] NIST 800-133 Recommendation for Cryptographic Key Generation, (Draft), August 2011./
[SP 800-135] NIST Special Publication (SP) 800-135, Recommendation for Existing Application-Specific Key Derivation Functions, Revision 1, December 2011./
[FIPS 180-4] Federal Information Processing Standard 180-4, Secure Hash Standard (SHS), March 2012./
[FIPS 186-2] Federal Information Processing Standard 186-2, Digital Signature Standard (DSS), January 2000./
[FIPS 186-3] Federal Information Processing Standard 186-3, Digital Signature Standard (DSS), June 2009./
[FIPS 198-1] Federal Information Processing Standard 198-1, The Keyed-Hash Message Authentication Code (HMAC), July 2008./
[SHA1 Attack] Wang X., Yin Y., and Yu H., Finding Collisions in the Full SHA-1, The 25th Annual International Cryptology/
Conference, Santa Barbara, California, USA, August 2005./
[Second Preimage Attack] Kelsey J. and Schneier B., Second Preimages on n-bit hash functions for Much Less than 2n Work, Lecture Notes in Computer Science, Vol. 3494, Springer, 2005, ISBN-10 3-540-25910-4./
[BCK1] M. Bellare, R. Canetti, and H. Krawczyk, Keyed Hash Functions for Message Authentication, Proceedings of Crypto'96, LNCS 1109, pp. 1-15. (http://www.research.ibm.com/security/keyed-md5.html)
|
9.
|
Qualification of
NIST:
|
|
Qualification of NIST: NIST is recognized under the provisions of ITU-T Recommendation A.5. Qualifying information is on file in TSB.
|
10.
|
Other (for any supplementary information):
|
|
None
|
|