|
1.
|
Clear description of the referenced document:
|
|
|
|
|
2.
|
Status of approval:
|
|
|
Federal Information Processing Standard (FIPS) approved 2012-03.
|
|
3.
|
Justification for the specific reference:
|
|
|
The specified hash is used in the semantics of the digitally signed content verification SEI message.
|
|
4.
|
Current information, if any, about IPR issues:
|
|
|
Some information may be available in the NIST Patents Database that can be accessed through https://www.nist.gov/tpo/patents
|
|
5.
|
Other useful information describing the "Quality" of the document:
|
|
|
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed since the digests were generated. This NIST document has been produced by Computer Security Division's (CSD) Security Technology Group of NIST has a subgroup that deals specifically with Cryptographic Technology Standards and Guidance (CTSG). CTSG is involved in the development, maintenance, and promotion of a number of standards and guidance that cover a wide range of cryptographic technology.
NIST has long term technical experience in dealing with cryptographic matters. The document has been publicly and internally reviewed before publication.
|
|
6.
|
The degree of stability or maturity of the document:
|
|
|
Published in August 2015. This Standard supersedes FIPS 180-3.
|
|
7.
|
Relationship with other existing or emerging documents:
|
|
|
None
|
|
8.
|
Any explicit references within that referenced document should also be listed:
|
|
|
APPENDIX B: REFERENCES/
[FIPS 180-3] NIST, Federal Information Processing Standards Publication 180-3, Secure Hash Standards (SHS) , October 2008. /
[SP 800-57] NIST Special Publication (SP) 800-57, Part 1, Recommendation for Key Management: General , (Draft) May 2011. /
[SP 800-107] NIST Special Publication (SP) 800-107, Recommendation for Applications Using Approved Hash Algorithms , (Revised), (Draft) September 2011.
|
|
9.
|
Qualification of
NIST:
|
|
|
Qualification of NIST: NIST is recognized under the provisions of ITU-T Recommendation A.5. Qualifying information is on file in TSB.
|
|
10.
|
Other (for any supplementary information):
|
|
|
N/A
|