27 June 2001
Source: http://www.access.gpo.gov/su_docs/aces/fr-cont.html

-------------------------------------------------------------------------

[Federal Register: June 27, 2001 (Volume 66, Number 124)]
[Notices]               
[Page 34154-34155]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr27jn01-48]                         

-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No. 980911236-0314-03]
RIN 0693-ZA22

 
Announcing Approval of Federal Information Processing Standard 
(FIPS) 140-2, Security Requirements for Cryptographic Modules

AGENCY: National Institute of Standards and Technology (NIST), 
Commerce.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: The Secretary of Commerce approves FIPS 140-2, Security 
Requirements for Cryptographic Modules, which supersedes FIPS Standard 
140-1, and makes it compulsory and binding on Federal agencies for the 
protection of sensitive, unclassified information, FIPS 140-1, which 
was first published in 1994, specified that it would be reviewed within 
five years. FIPS 140-2 is the result of the review and replaces FIPS 
140-1.

DATE: This standard is effective November 25, 2001.

FOR FURTHER INFORMATION CONTACT: Mr. Ray Snouffer, (301) 975-4436, 
National Institute of Standards and Technology, 100 Bureau Drive, STOP 
8930, Gaithersburg, MD 20899-8930.
    A copy of FIPS 140-2 is available electronically from the NIST 
website at:
http://csrc.nist.gov/cryptval/>

SUPPLEMENTARY INFORMATION: FIPS 140-1, Security Requirements for 
Cryptographic Modules, first issued in 1994, identified requirements 
for four security levels for cryptographic modules to provide for a 
wide spectrum of data sensitivity (e.g., low value administrative data, 
million dollar funds transfers, and life protecting data), and a 
diversity of application environments. Over 140 modules have been 
tested by accredited private-sector laboratories and validated to-date 
as conforming to this standard. The standard provided that it be 
reviewed within five years to consider its continued usefulness and to 
determine whether new or revised requirements should be added.

[[Page 34155]]

    A notice was published in the Federal Register (63 FR 56910) on 
October 23, 1998, soliciting public comments on reaffirming FIPS 140-1. 
The comments supported reaffirming FIPS 140-1 with technical 
modifications to address advances in technology since FIPS 140-1 was 
issued. A notice was published in the Federal Register (64 FR 62654) on 
November 17, 1999, soliciting public comments on proposed FIPS 140-2, a 
revision of FIPS 140-1 making such technical modifications. The 
comments received (available at http://csrc.nist.gov/cryptval/) 
supported the issuance of proposed FIPS 140-2 with technical and 
editorial changes. None of them opposed the proposed revision of FIPS 
140-1.
    The Secretary of Commerce, after making appropriate revisions to 
proposed FIPS 140-2, approves it, and makes it compulsory and binding 
on Federal agencies for the protection of sensitive, unclassified 
information.

    Authority: Under Section 5131 of the Information Technology 
Management Reform Act of 1996 and the Computer Security Act of 1987, 
the Secretary of Commerce is authorized to approve standards and 
guidelines for the cost effective security and privacy of sensitive 
information processed by federal computer systems.

    E.O. 12866: This notice has been determined to be significant for 
the purposes of E.O. 12866.

    Dated: June 21, 2001.
Karen H. Brown,
Acting Director, NIST.
[FR Doc. 01-16186 Filed 6-26-01; 8:45 am]
BILLING CODE 3510-CN-M

----------------------------------------------------------------------

[Federal Register: June 27, 2001 (Volume 66, Number 124)]
[Notices]               
[Page 34155]
From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr27jn01-49]                         

-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

 
Cryptographic Key Management Workshop

AGENCY: National Institute of Standards and Technology (NIST), 
Commerce.

ACTION: Notice of public workshop.

-----------------------------------------------------------------------

SUMMARY: The National Institute of Standards and Technology (NIST) 
announces a workshop to discuss the development of Cryptographic Key 
Management guidance for Federal Government applications. The workshop 
will be held to review and discuss draft documentation that will be 
available prior to the workshop.

DATES: The Key Management Workshop will be held on November 1-2, 2001, 
from 9 a.m. to 5 p.m.

ADDRESSES: The Key Management workshop will be held in the 
Administration Building (Bldg. 101), Lecture Room A, National Institute 
of Standards and Technology, Gaithersburg, MD.

FOR FURTHER INFORMATION CONTACT: Further information may be obtained 
from the Key Management web site at <A HREF="http://frwebgate.access.gpo.gov/cgi-bin/leaving.cgi?from=leavingFR.html&log=linklog&to=http://www.nist.gov/kms">http://www.nist.gov/kms</A> or by 
contacting Elaine Barker, National Institute of Standards and 
Technology, Building 100 Bureau Drive, Stop 8930, Gaithersburg, MD 
20899-8930; telephone 301-975-2911; Fax 301-948-1233, or email 
<A HREF="mailto:ebarker@nist.gov">ebarker@nist.gov</A>.

SUPPLEMENTARY INFORMATION: Electronic Commerce needs well-established 
cryptographic schemes that can provide such services as data integrity 
and confidentiality. Symmetric encryption schemes such as Triple DES, 
as defined in FIPS 46-3, and the Advanced Encryption Standard (AES) 
make attractive choices for the provision of these services. Systems 
using symmetric techniques are efficient, and their security 
requirements are well understood. Furthermore, these schemes have been 
or will be standardized to facilitate interoperability between systems. 
However, the implementation of such schemes requires the establishment 
of a shared secret key in advance. As the size of a key management 
system or the number of entities using a system grows, the need for key 
establishment can lead to a key management problem.
    In 1997, NIST announced plans to develop a public key-based key 
management standard and solicited comments from the public. In February 
of 2000, a public workshop was held to examine key establishment 
techniques that are currently available and to discuss the approach to 
the development of a Key Management Standard for Federal Government 
use. The workshop attendees suggested (1) the development of a 
``framework'' document that discusses the documents to be developed and 
their proposed content, (2) the identification of key establishment 
schemes, and (3) the development of key management guidance.
    Following the workshop, the framework document was prepared and 
made available for review on the Key Management web page (<A HREF="http://frwebgate.access.gpo.gov/cgi-bin/leaving.cgi?from=leavingFR.html&log=linklog&to=http://www.nist.gov/kms">http://
www.nist.gov/kms</A>). A key establishment scheme definition document and a 
key management guidance document are currently under development. 
Initial drafts of these documents will be made available on the Key 
Management web page at least one month prior to the workshop and will 
be the subjects under discussion during that workshop.
    For planning purposes, advance registration is encouraged. To 
register, please fax your name, address, telephone, fax and e-mail 
address to 301-926-2733 (Attn: Key Management Workshop) by October 19, 
2000. Registration questions should be addressed to Vickie Harris on 
301-975-2034. Registration will also be available at the door, space 
permitting. The workshop will be open to the public and is free of 
charge.

    Authority: This work is being initiated pursuant to NIST's 
responsibilities under the Computer Security Act of 1987, the 
Information Technology Management Reform Act of 1996, Executive 
Order 13011, and OMB Circular A-130.

    Dated: June 21, 2001.
Karen H. Brown,
Acting Director, NIST.
[FR Doc. 01-16187 Filed 6-26-01; 8:45 am]
BILLING CODE 3510-CN-M