02720nam 2200541Ka 450 991069519820332120060605121548.0GOVPUB-C13-50b9f86051c0593ae10828059180a6ed(CKB)5470000002366744(OCoLC)69854872(OCoLC)724649742(OCoLC)927736500(EXLCZ)99547000000236674420060605d2005 ua 0engurmn|||||||||txtrdacontentcrdamediacrrdacarrierCryptographic algorithms and key sizes for personal identity verification[electronic resource] /W. Timothy Polk, Donna F. Dodson, William E. BurrDraft.Gaithersburg, MD :U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,[2005]103 unnumbered pages digital, PDF fileNIST special publication ;800-78Title from title screen (viewed on May 17, 2005)."April 2005."Includes bibliographical references.SP 800-78-1 has been modified to enhance interoperability, simplify the development of relying party applications, and enhance alignment with the National Security Agency's Suite B Cryptography [SUITE B]. Revision 1 reduces the set of elliptic curves approved for use with PIV cards and the supporting infrastructure from six curves to two. Also, SHA-384 has been added for use with Curve P-384 in this revision. And finally, this revision eliminates the largest size of RSA keys (3072 bits) on PIV cards. These changes simplify applications that require maximum interoperability: the number of OIDs that must be recognized (e.g., in certificates) has been significantly reduced; and elliptic curve implementations of elliptic curve cryptography can be optimized for operations over two specific curves.Computer securityStandardsData encryption (Computer science)Conformance testCryptographic algorithmsFIPS 201Key sizesPersonal Identity VerificationPKIComputer securityStandards.Data encryption (Computer science)Polk William T1383744Dodson Donna F1383745Burr William E1383746National Institute of Standards and Technology (U.S.)GPOGPOBOOK9910695198203321Cryptographic algorithms and key sizes for personal identity verification3429041UNINA