This site displays a prototype of a “Web 2.0” version of the daily Federal Register. It is not an official legal edition of the Federal Register, and does not replace the official print version or the official electronic version on GPO’s govinfo.gov.
The documents posted on this site are XML renditions of published Federal Register documents. Each document posted on the site includes a link to the corresponding official PDF file on govinfo.gov. This prototype edition of the daily Federal Register on FederalRegister.gov will remain an unofficial informational resource until the Administrative Committee of the Federal Register (ACFR) issues a regulation granting it official legal status. For complete information about, and access to, our official publications and services, go to About the Federal Register on NARA's archives.gov.
The OFR/GPO partnership is committed to presenting accurate and reliable regulatory information on FederalRegister.gov with the objective of establishing the XML-based Federal Register as an ACFR-sanctioned publication in the future. While every effort has been made to ensure that the material on FederalRegister.gov is accurately displayed, consistent with the official SGML-based PDF version on govinfo.gov, those relying on it for legal research should verify their results against an official edition of the Federal Register. Until the ACFR grants it official status, the XML rendition of the daily Federal Register on FederalRegister.gov does not provide legal notice to the public or judicial notice to the courts.
National Institute of Standards and Technology, Commerce.
Notice and request for comments.
This notice announces the Draft Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard (SHS), for public review and comment. The draft standard, designated “Draft FIPS 180-3,” is proposed to supersede FIPS 180-2. FIPS 180-2, Secure Hash Standard (SHS), August 2002, specifies secure hash algorithms (SHA) called SHA-1, SHA-256, SHA-384 and SHA-512. These algorithms produce 160, 256, 384, and 512-bit outputs, respectively, which are called message digests. An additional secure hash algorithm, called SHA-224, that produces a 224-bit output, is specified in Change Notice 1 to FIPS 180-2, which was issued in 2004. Draft FIPS 180-3 specifies five secure hash algorithms: SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. The proposed standard is available at http://csrc.nist.gov/publications/drafts.html.
Prior to the submission of this proposed standard to the Secretary of Commerce for review and approval, it is essential that consideration be given to the needs and views of the public, users, the information technology industry, and Federal, State, and local government organizations. The purpose of this notice is to solicit such views.
Comments must be received by September 10, 2007.
Written comments may be sent to: Chief, Computer Security Division, Information Technology Laboratory, Attention: Comments on Draft FIPS 180-3, 100 Bureau Drive—Stop 8930, National Institute of Standards and Technology, Gaithersburg, MD 20899-8930. Electronic comments may be sent to: Proposed180firstname.lastname@example.org. The current FIPS 180-2 and its proposed replacement, Draft FIPS 180-3, are available electronically at http://csrc.nist.gov/publications/index.html.
Comments received in response to this notice will be published electronically at http://csrc.nist.gov/CryptoToolkit/tkhash.html.Start Further Info
FOR FURTHER INFORMATION CONTACT:
For general information, contact: Elaine Barker, National Institute of Standards and Technology, Stop 8930, Gaithersburg, MD 20899-8930, telephone: 301-975-2911, e-mail: email@example.com. or via fax at 301-975-8670, or Quynh Dang, telephone: 301-975-3610, e-mail: firstname.lastname@example.org.End Further Info End Preamble Start Supplemental Information
The changes between FIPS 180-2 and FIPS 180-3 are minor and are motivated by a desire to put informative information that is subject to change in a less formal publication that can be readily updated as necessary. FIPS 180-2 contained statements about the security strengths of the hash algorithms. However, the security strengths of the hashing algorithms, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512, might change due to future cryptanalysis; consequently, Draft FIPS 180-3 does not describe their security strengths. Instead, the security strengths will be specified in NIST Special Publications (SP) 800-57, Recommendation for Key Management, and discussed in NIST SP 800-107, Recommendation for Using Approved Hash Algorithms. These Special Publications will be periodically reviewed and updated if warranted by advances in the cryptanalysis of these hash algorithms. Examples of the implementation of these hash algorithms can be found at http://www.nist.gov/CryptoToolkitExamples. NIST Special Publications are available at: http://csrc.nist.gov/publications/index.html.Start Signature
Dated: June 5, 2007.
James M. Turner,
Deputy Director, NIST.
[FR Doc. E7-11326 Filed 6-11-07; 8:45 am]
BILLING CODE 3510-13-P