LEADER 02720nam 2200541Ka 450 001 9910695198203321 005 20060605121548.0 024 8 $aGOVPUB-C13-50b9f86051c0593ae10828059180a6ed 035 $a(CKB)5470000002366744 035 $a(OCoLC)69854872 035 $a(OCoLC)724649742 035 $a(OCoLC)927736500 035 $a(EXLCZ)995470000002366744 100 $a20060605d2005 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptographic algorithms and key sizes for personal identity verification$b[electronic resource] /$fW. Timothy Polk, Donna F. Dodson, William E. Burr 205 $aDraft. 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,$d[2005] 215 $a103 unnumbered pages $cdigital, PDF file 225 1 $aNIST special publication ;$v800-78 300 $aTitle from title screen (viewed on May 17, 2005). 300 $a"April 2005." 320 $aIncludes bibliographical references. 330 3 $aSP 800-78-1 has been modified to enhance interoperability, simplify the development of relying party applications, and enhance alignment with the National Security Agency's Suite B Cryptography [SUITE B]. Revision 1 reduces the set of elliptic curves approved for use with PIV cards and the supporting infrastructure from six curves to two. Also, SHA-384 has been added for use with Curve P-384 in this revision. And finally, this revision eliminates the largest size of RSA keys (3072 bits) on PIV cards. These changes simplify applications that require maximum interoperability: the number of OIDs that must be recognized (e.g., in certificates) has been significantly reduced; and elliptic curve implementations of elliptic curve cryptography can be optimized for operations over two specific curves. 606 $aComputer security$xStandards 606 $aData encryption (Computer science) 610 $aConformance test 610 $aCryptographic algorithms 610 $aFIPS 201 610 $aKey sizes 610 $aPersonal Identity Verification 610 $aPKI 615 0$aComputer security$xStandards. 615 0$aData encryption (Computer science) 700 $aPolk$b William T$01383744 701 $aDodson$b Donna F$01383745 701 $aBurr$b William E$01383746 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910695198203321 996 $aCryptographic algorithms and key sizes for personal identity verification$93429041 997 $aUNINA