Криптоалгоритмы, рекомендуемые NIST - Cryptographic Module Validation Program (CMVP) that validates cryptographic modules to Federal Information Processing Standards (FIPS)140-1 Security Requirements for Cryptographic Modules, and other FIPS cryptography based standards.
Symmetric Key (AES, TDEA and EES)
1. Advanced Encryption Standard (AES)
National Institute of Standards and Technology, Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, November 26, 2001.
National Institute of Standards and Technology, Recommendation for Block Cipher Modes of
Operation, Methods and Techniques, Special Publication 800-38A, December 2001.
National Institute of Standards and Technology, Recommendation for Block Cipher Modes of
Operation: Three Variants of Ciphertext Stealing for CBC Mode, Addendum to Special Publication 800-38A, October 2010.
National Institute of Standards and Technology, Recommendation for Block Cipher Modes of
Operation: The CCM Mode for Authentication and Confidentiality, Special Publication 800-38C, May 2004. National Institute of Standards and Technology, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, Special Publication 800-38D, November 2007. National Institute of Standards and Technology, Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices, Special Publication 800-38E, January 2010.
2. Triple-DES Encryption Algorithm (TDEA)
National Institute of Standards and Technology, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, Special Publication 800-67, May 2004.
National Institute of Standards and Technology, Recommendation for Block Cipher Modes of
Operation, Methods and Techniques, Special Publication 800-38A, December 2001. Appendix E references Modes of Triple-DES. American Bankers Association, Triple Data Encryption Algorithm Modes of Operation, ANSI X9.52- 1998. Copies of X9.52-1998 may be obtained from X9, a standards committee for the financial services industry.
3. Escrowed Encryption Standard (EES)
National Institute of Standards and Technology, Escrowed Encryption Standard (EES), Federal
Information Processing Standards Publication 185, February 9, 1984.
NIST Computer Security Division Page 2 07/26/2011 Skipjack and KEA Algorithm Specifications, Version 2.0, May 29, 1998.
Asymmetric Key (DSS – DSA, RSA and ECDSA)
1. Digital Signature Standard (DSS)
National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal
Information Processing Standards Publication 186-3, June, 2009. (DSA2, RSA2 and ECDSA2)
National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal
Information Processing Standards Publication 186-2, January, 2000 with Change Notice 1. (DSA, RSA and ECDSA)
RSA Laboratories, PKCS#1 v2.1: RSA Cryptography Standard, June 14, 2002. Only the versions of the algorithms RSASSA-PKCS1-v1_5 and RSASSA-PSS contained within this document shall be used.
Secure Hash Standard (SHS)
1. Secure Hash Standard (SHS) (SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512)
National Institute of Standards and Technology, Secure Hash Standard, Federal Information
Processing Standards Publication 180-3, October, 2008.
Random Number Generators (RNG and DRBG)
1. Annex C: Approved Random Number Generators
National Institute of Standards and Technology, Annex C: Approved Random Number Generators for FIPS 140-2, Security Requirements for Cryptographic Modules.
Message Authentication (Triple-DES, AES and SHS)
1. Triple-DES
National Institute of Standards and Technology, Computer Data Authentication, Federal Information Processing Standards Publication 113, 30 May 1985.
2. AES
National Institute of Standards and Technology, Recommendation for Block Cipher Modes of
Operation: The CMAC Mode for Authentication, Special Publication 800-38B, May 2005.
National Institute of Standards and Technology, Recommendation for Block Cipher Modes of
Operation: The CCM Mode for Authentication and Confidentiality, Special Publication 800-38C, May 2004. National Institute of Standards and Technology, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, Special Publication 800-38D, November 2007.
3. SHS
National Institute of Standards and Technology, The Keyed-Hash Message Authentication Code NIST Comput
Комментариев нет:
Отправить комментарий