1.
|
Clear description of the referenced document:
|
|
|
2.
|
Status of approval:
|
|
Approved NIST standards.
|
3.
|
Justification for the specific reference:
|
|
Cryptographic keys storage requirements
|
4.
|
Current information, if any, about IPR issues:
|
|
None known
|
5.
|
Other useful information describing the "Quality" of the document:
|
|
The specifications are freely available on the NIST web site. They have been widely implemented.
|
6.
|
The degree of stability or maturity of the document:
|
|
Widely implemented basic specifications within the industry.
|
7.
|
Relationship with other existing or emerging documents:
|
|
None known.
|
8.
|
Any explicit references within that referenced document should also be listed:
|
|
FIPS PUB 46-3, Data Encryption Standard./
b. FIPS PUB 74, Guidelines for Implementing and Using the NBS Data Encryption Standard./
c. FIPS PUB 81, DES Modes of Operation./
d. FIPS PUB 113, Computer Data Authentication/
FIPS PUB 171, Key Management Using ANSI X9.17./
f. FIPS PUB 180-1, Secure Hash Standard./
g. FIPS PUB 186-2, Digital Signature Standard./
h. Special Publication 800-2, Public Key Cryptography./
i. Special Publication 800-20, Modes of Operation Validation System for the Triple Data Encryption/
Algorithm (TMOVS): Requirements and Procedures
|
9.
|
Qualification of
NIST:
|
|
Qualification of NIST: NIST is recognized under the provisions of ITU-T Recommendation A.5. Qualifying information is on file in TSB.
|
10.
|
Other (for any supplementary information):
|
|
None
|