96-32494. Announcing Development of a Federal Information Processing Standard for Advanced Encryption Standard  

  • [Federal Register Volume 62, Number 1 (Thursday, January 2, 1997)]
    [Notices]
    [Pages 93-94]
    From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
    [FR Doc No: 96-32494]
    
    
    =======================================================================
    -----------------------------------------------------------------------
    
    DEPARTMENT OF COMMERCE
    
    National Institute of Standards and Technology
    [Docket No. 960924272-6272-01]
    RIN 0693-ZA13
    
    
    Announcing Development of a Federal Information Processing 
    Standard for Advanced Encryption Standard
    
    AGENCY: National Institute of Standards and Technology (NIST), 
    Commerce.
    
    ACTION: Notice; Request for comments.
    
    -----------------------------------------------------------------------
    
    SUMMARY: A process to develop a Federal Information Processing Standard 
    (FIPS) for Advanced Encryption Standard (AES) incorporating an Advanced 
    Encryption Algorithm (AEA) is being initiated by the National Institute 
    of Standards and Technology (NIST). As the first step in this process, 
    draft minimum acceptability requirements and draft criteria to evaluate 
    candidate algorithms are being published for comment. Also announced 
    for comment are draft submission requirements. An open, public workshop 
    on the draft minimum acceptability requirements, evaluation criteria 
    and submission requirements has also been scheduled. It is intended 
    that the AES will specify an unclassified, publicly disclosed 
    encryption algorithm capable of protecting sensitive government 
    information well into the next century.
        The purpose of this notice is to solicit views from the public, 
    manufacturers, voluntary standards organizations, and Federal, state, 
    and local government users so that their needs can be considered in the 
    process of developing the AES.
    
    DATES: Comments must be received on or before April 2, 1997.
        The AES Evaluation Criteria/Submission Requirements Workshop will 
    be held on April 15, 1997, from 9:00 a.m. to 4:00 p.m.
    
    ADDRESSES: Written comments should be sent to Director, Computer 
    Systems Laboratory, Attn: FIPS for AES Comments, Technology Building, 
    Room A231, National Institute of Standards and Technology, 
    Gaithersburg, MD 20899.
        Electronic comments may be sent to [email protected]
        Comments received in response to this notice will be made part of 
    the public record and will be made available for inspection and copying 
    in the Central Records and Reference Inspection Facility, Room 6020, 
    Herbert C. Hoover Building, 14th Street between Pennsylvania and 
    Constitution Avenues, NW, Washington, DC, 20230.
        The AES Criteria Workshop will be held at the Green Auditorium, 
    Administration Building, National Institute of Standards and 
    Technology, Gaithersburg, Maryland. Copies of the comments submitted 
    will be available at the Workshop. For planning purposes, advance 
    registration is encouraged. To register, please fax your name, address, 
    telephone, fax and e-mail address to 301-948-1233 (Attn: AES Criteria 
    Workshop) by April 10, 1997. Registration will also be available at the 
    door. The workshop will be open to the public.
    
    FOR FURTHER INFORMATION CONTACT:
    Edward Roback, National Institute of Standards and Technology, Building 
    820, Room 426, Gaithersburg, MD 20899; telephone 301-975-3696 or via 
    fax at 301-948-1233. Technical inquiries regarding the proposed draft 
    evaluation criteria and draft submission requirements should be 
    addressed to Miles Smid, National Institute of Standards and 
    Technology, Building 820, Room 426, Gaithersburg, MD 20899; telephone 
    301-975-2938 or via fax at 301-948-1233.
    
    SUPPLEMENTARY INFORMATION: This work effort is being initiated pursuant 
    to NIST's responsibilities under the Computer Security Act of 1987, the 
    Information Technology Management Reform Act of 1996, Executive Order 
    13011, and OMB Circular A-130.
        NIST recognizes that many institutions, both within and outside the 
    Federal Government, have considerable investments in their current 
    installed base of encryption equipment implementing the Data Encryption 
    Algorithm, specified in the Data Encryption Standard (DES, Federal 
    Information Processing Standard 46-2). DES was first approved in 1977 
    and was most recently reaffirmed by the Secretary in 1993, until 
    December 1998. In 1993 the following statement was included in the 
    standard:
        ``At the next review (1998), the algorithm specified in this 
    standard will be over twenty years old. NIST will consider alternatives 
    which offer a higher level of security. One of these alternatives may 
    be proposed as a replacement standard at the 1998 review.''
        It is NIST's review that a multi-year transition period will be 
    necessary to move toward any new encryption standard and that DES will 
    continue to be of sufficient strength for many applications. NIST will 
    consult with all interested parties so that a smooth transition can be 
    accomplished.
        In order to provide a basis for the evaluation of encryption 
    algorithms submitted to be considered as the AEA for incorporation into 
    the FIPS for AES, evaluation criteria will be used to review submitted 
    algorithms. Comments on the draft criteria (and, at the appropriate 
    time, or candidate algorithms) from voluntary consensus standards 
    organizations are particularly encouraged.
    
    Proposed Draft Minimum Acceptability Requirements and Evaluation 
    Criteria
    
        The draft minimum acceptability requirements and evaluation 
    criteria are:
        A.1  AES shall be publicly defined.
        A.2  AES shall be a symmetric block cipher.
        A.3  AES shall be designed so that the key length may be increased 
    as needed.
        A.4  AES shall be implementable in both hardware and software.
        A.5  AES shall either be (a) freely available or (b) available 
    under terms consistent with the American National Standards Institute 
    (ANSI) patent policy.
        A.6  Algorithms which meet the above requirements will be judged 
    based on the following factors:
        (a) Security (i.e., the effort required to cryptanalyze),
        (b) Computational efficiency,
        (c) Memory requirements,
        (d) Hardware and software suitability,
        (e) Simplicity,
        (f) Flexibility, and
        (g) Licensing requirements.
        Comments are being sought on these draft minimum acceptability 
    criteria and evaluation criteria, suggestions for other criteria, and 
    relative importance of each individual criterion in the evaluation 
    process. Criteria will be finalized by NIST following the criteria 
    workshop.
    
    Proposed Draft Submission Requirements
    
        In order to provide for an orderly, fair, and timely evaluation of 
    candidate algorithm proposals, submission requirements will specify the 
    procedures and supporting documentation necessary to submit a candidate 
    algorithm.
    
    [[Page 94]]
    
        B.1  A complete written specification of the algorithm including 
    all necessary mathematical equations, tables, and parameters needed to 
    implement the algorithm.
        B.2  Software implementation and source code, in ANSI C code, which 
    will compile on a personal computer. This code will be used to compare 
    software performance and memory requirements with respect to other 
    algorithms.
        B.3  Statement of estimated computational efficiency in hardware 
    and software.
        B.4  Encryption example mapping a specified plaintext value into 
    ciphertext.
        B.5  Statement of licensing requirements and patents which may be 
    infringed by implementations of this algorithm.
        B.6  An analysis of the algorithm with respect to known attacks.
        B.7  Statement of advantages and limitations of the submitted 
    algorithm.
    
    (end of draft submission requirements)
        Since both the evaluation criteria and submission requirements have 
    not yet been set, candidate algorithms should NOT be submitted at this 
    time.
    
        Dated: December 16, 1996.
    Samuel Kramer,
    Associate Director.
    [FR Doc. 96-32494 Filed 12-31-96; 8:45 am]
    BILLING CODE 3510-CN-M
    
    
    

Document Information

Published:
01/02/1997
Department:
National Institute of Standards and Technology
Entry Type:
Notice
Action:
Notice; Request for comments.
Document Number:
96-32494
Dates:
Comments must be received on or before April 2, 1997.
Pages:
93-94 (2 pages)
Docket Numbers:
Docket No. 960924272-6272-01
RINs:
0693-ZA13
PDF File:
96-32494.pdf