94-16666. Proposed Revision of Federal Information Processing Standard (FIPS) 180, Secure Hash Standard  

  • [Federal Register Volume 59, Number 131 (Monday, July 11, 1994)]
    [Unknown Section]
    [Page 0]
    From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
    [FR Doc No: 94-16666]
    
    
    [[Page Unknown]]
    
    [Federal Register: July 11, 1994]
    
    
    -----------------------------------------------------------------------
    
    DEPARTMENT OF COMMERCE
    [Docket No. 940675-4175]
    RIN 0693-AB33
    
     
    
    Proposed Revision of Federal Information Processing Standard 
    (FIPS) 180, Secure Hash Standard
    
    AGENCY: National Institute of Standards and Technology (NIST), 
    Commerce.
    
    ACTION: Notice; Request for comments.
    
    -----------------------------------------------------------------------
    
    SUMMARY: A revision of Federal Information Processing Standard (FIPS) 
    180, Secure Hash Standard (SHS), is being proposed. This proposed 
    revision corrects a technical flaw that made the standard less secure 
    than had been thought. The algorithm is still reliable as a security 
    mechanism, but the correction returns the SHS to the original level of 
    security.
        The SHS produces a 160-bit output called a message digest for a 
    message of any size. This message digest can be used with FIPS 186, 
    Digital Signature Standard (DSS), to compute a signature for the 
    message. The same message digest should be obtained by the verifier of 
    the signature when the received version of the message is used as input 
    to the Secure Hash Algorithm (SHA). Any change to the message in 
    transmit should produce a different message digest, indicating to the 
    verifier that a change has been made to the message.
        The purpose of this notice is to solicit views from the public, 
    manufacturers, and Federal, state, and local government users prior to 
    submission of this proposed revision to the Secretary of Commerce for 
    review and approval.
        The proposed revision contains two sections: (1) An announcement, 
    which provides information concerning the applicability, 
    implementation, and maintenance of the standard; and (2) specifications 
    which deal with the technical aspects of the standard. Only the 
    announcement section of the standard is provided in this notice. 
    Interest parties may obtain copies of the specifications section from 
    the Standards Processing Coordinator (ADP), National Institute of 
    Standards and Technology, Technology Building, Room B-64, Gaithersburg, 
    MD 20899, telephone (301) 975-2816.
    
    DATES: Comments on this proposed revision must be received on or before 
    October 11, 1994.
    
    ADDRESSES: Written comments concerning the proposed revision should be 
    sent to: Director, Computer Systems Laboratory, ATTN: Proposed Revision 
    of FIPS 180, SHS, Technology Building, Room B-154, National Institute 
    of Standards and Technology, Gaithersburg, MD 20899
        Written comments received in response to this notice will be made 
    part of the public record and will be made available for inspection and 
    copying in the Central Reference and Records Inspection Facility, Room 
    6020, Herbert C. Hoover Building, 14th Street between Pennsylvania and 
    Constitution Avenues, NW., Washington, DC 20230.
    
    FOR FURTHER INFORMATION CONTACT:
    Mr. Miles Smid, National Institute of Standards and Technology, 
    Gaithersburg, MD 20899, telephone (301) 975-2938.
    
    SUPPLEMENTARY INFORMATION: NIST has been notified that Department of 
    Defense authorities have approved the use of the SHS with the DSS to 
    sign unclassified data processed by ``Warner Amendment'' systems (10 
    U.S.C. 2315 and 44 U.S.C. 3502(2)) as well as classified data in 
    selected applications.
    
        Dated: July 5, 1994.
    Samuel Kramer,
    Associate Director.
    
    Proposed Federal Information Processing Standards Publication 180-1
    
    1994 May 31
    
    Announcing the Secure Hash Standard
    
        Federal Information Processing Standards Publications (FIPS PUBS) 
    are issued by the National Institute of Standards and Technology (NIST) 
    after approval by the Secretary of Commerce pursuant to Section 111(d) 
    of the Federal Property and Administrative Services Act of 1949 as 
    amended by the Computer Security Act of 1987, Public Law 100-235.
        Name of Standard: Secure Hash Standard.
        Category of Standard: Computer Security.
        Explanation: This Standard specifies a secure hash algorithm, SHA-
    1, for computing a condensed representation of a message or a data 
    file. When a message of any length <>64 bits is input, the SHA-1 
    produces a 160-bit output called a message digest. The message digest 
    can then be input to the Digital Signature Algorithm (DSA) which 
    generates or verifies the signature for the message (see Figure 1). 
    Signing the message digest rather than the message often improves the 
    efficiency of the process because the message digest is usually much 
    smaller in size than the message. The same hash algorithm must be used 
    by the verifier of a digital signature as was used by the creator of 
    the digital signature.
        The SHA-1 is called secure because it is computationally infeasible 
    to find a message which corresponds to a given message digest, or to 
    find two different messages which produce the same message digest. Any 
    change to a message in transit will, with very high probability, result 
    in a different message digest, and the signature will fail to verify. 
    SHA-1 is a technical revision of SHA (FIPS 180). A circular left shift 
    operation has been added to the specifications in section 7, line b, 
    page 9 of FIPS 180 and its equivalent in section 8, line c, page 10 of 
    FIPS 180.* This revision improves the security provided by this 
    standard. The SHA-1 is based on principles similar to those used by 
    Professor Ronald L. Rivest of MIT when designing the MD4 message:
    
    *Modification
    
    In Section 7 of [1] (page 9), the line which reads
        (b) For t=16 to 79 let Wt = Wt-3 XOR Wt-8 XOR 
    Wt-14 XOR Wt-16.
    is to be replaced by
        (b) For t=16 to 79 let Wt = S1(Wt-3 XOR Wt-8 
    XOR Wt-14 XOR Wt-16.
    where S1 is a left circular shift by one bit as defined in Section 
    3 of [1] (page 6), namely S1(X) = (X <><1) v="" (x=""> > 31).
    
    TN11JY94.000
    
    BILLING CODE 3510-CN-C
        Applications: The SHA-1 may be used with the DSA in electronic 
    mail, electronic funds transfer, software distribution, data storage, 
    and other applications which require data integrity assurance and data 
    origin authentication. The SHA-1 may also be used whenever it is 
    necessary to generate a condensed version of a message.
        Implementations: The SHA-1 may be implemented in software, 
    firmware, hardware, or any combination thereof. Only implementations of 
    the SHA-1 that are validated by NIST will be considered as complying 
    with this standard. Information about the requirements for validating 
    implementations of this standard can be obtained from the National 
    Institute of Standards and Technology, Computer Systems Laboratory, 
    Attn: SHS Validation, Gaithersburg, MD 20899.
        Export Control: Implementations of this standard are subject to 
    Federal Government export controls as specified in Title 15, Code of 
    Federal Regulations, Parts 768 through 799. Exporters are advised to 
    contact the Department of Commerce, Bureau of Export Administration for 
    more information.
        Patents: Implementations of the SHA-1 in this standard may be 
    covered by U.S. and foreign patents.
        Implementation Schedule: This standard becomes effective (insert 90 
    days after approval by the Secretary of Commerce).
        Specifications: Federal Information Processing Standards (FIPS 180-
    1) Secure Hash Standard (affixed).
        Cross Index:
        a. FIPS PUB 46-1, Data Encryption Standard.
        b. FIPS PUB 73, Guidelines for Security of Computer Applications.
        c. FIPS PUB 140-1, Security Requirements for Cryptographic Modules.
        d. FIPS PUB 186, Digital Signature Standard.
        e. Federal Information Resources Management Regulations (FIRMR) 
    subpart 201.20.303, Standards, and subpart 201.39.1002, Federal 
    Standards.
        Objectives: The objectives of this standard are to:
        a. Specify the secure hash algorithm required for use with the 
    Digital Signature Standard (FIPS 186) in the generation and 
    verification of digital signatures;
        b. Specify the secure hash algorithm to be used whenever a secure 
    hash algorithm is required for Federal applications; and
        c. Encourage the adoption and use of the specified secure hash 
    algorithm by private and commercial organizations.
        Qualifications: While it is the intent of this standard to specify 
    a secure hash algorithm, conformance to this standard does not assure 
    that a particular implementation is secure. The responsible authority 
    in each agency or department shall assure that an overall 
    implementation provides an acceptable level of security. This standard 
    will be reviewed every five years in order to assess its adequacy.
        Waiver Procedure: Under certain exceptional circumstances, the 
    heads of Federal departments and agencies may approve waivers to 
    Federal Information Processing Standards (FIPS). The head of such 
    agency may redelegate such authority only to a senior official 
    designated pursuant to section 3506(b) of Title 44, United States Code. 
    Waiver shall be granted only when:
        a. Compliance with a standard would adversely affect the 
    accomplishment of the mission of an operator of a Federal computer 
    system; or
        b. Compliance with a standard would cause a major adverse financial 
    impact on the operator which is not offset by Government-wide savings.
        Agency heads may act upon a written waiver request containing the 
    information detailed above. Agency heads may also act without a written 
    waiver request when they determine that conditions for meeting the 
    standing cannot be met. Agency heads may approve waivers only by a 
    written decision which explains the basis on which the agency head made 
    the required finding(s). A copy of each decision, with procurement 
    sensitive or classified portions clearly identified, shall be sent to: 
    National Institute of Standards and Technology; ATTN: FIPS Waiver 
    Decisions, Technology Building, Room B-154, Gaithersburg, MD 20899.
        In addition, notice of each waiver granted and each delegation of 
    authority to approve waivers shall be sent promptly to the Committee on 
    Government Operations of the House of Representatives and the Committee 
    on Government Affairs of the Senate and shall be published promptly in 
    the Federal Register.
        When the determination on a waiver applies to the procurement of 
    equipment and/or services, a notice of the waiver determination must be 
    published in the Commerce Business Daily as part of the notice of 
    solicitation for offers of an acquisition or, if the waiver 
    determination is made after that notice is published, by amendment to 
    such notice.
        A copy of the waiver, any supporting documents, the document 
    approving the waiver and any accompanying documents, with such 
    deletions as the agency is authorized and decides to make under 5 
    United States Code Section 552(b), shall be part of the procurement 
    documentation and retained by the agency.
        Where to Obtain Copies of the Standard: Copies of this publication 
    are for sale by the National Technical Information Service, U.S. 
    Department of Commerce, Springfield, VA 22161. When ordering, refer to 
    Federal Information Processing Standards Publication 180-1 (FIPS PUB 
    180-1), and identify the title. When microfiche is desired, this should 
    be specified. Prices are published by NTIS in current catalogs and 
    other issuances. Payment may be made by check, money order, deposit 
    account or charged to a credit card accepted by NTIS.
    
    [FR Doc. 94-16666 Filed 7-8-94; 8:45 am]
    BILLING CODE 3510-CN-M
    
    
    

Document Information

Published:
07/11/1994
Department:
Commerce Department
Entry Type:
Uncategorized Document
Action:
Notice; Request for comments.
Document Number:
94-16666
Dates:
Comments on this proposed revision must be received on or before October 11, 1994.
Pages:
0-0 (1 pages)
Docket Numbers:
Federal Register: July 11, 1994, Docket No. 940675-4175
RINs:
0693-AB33