1.
|
Clear description of the referenced document:
|
|
Name:
|
NIST SP 800-185
|
Title:
|
SHA-3 DERIVED FUNCTIONS: CSHAKE, KMAC, TUPLEHASH, AND PARALLELHASH
|
|
2.
|
Status of approval:
|
|
Approved
|
3.
|
Justification for the specific reference:
|
|
Listed as a normative reference
|
4.
|
Current information, if any, about IPR issues:
|
|
Some information may be available in the NIST Patents Database that can be accessed through http://patapsco.nist.gov/ts/220/sharedpatent/index.cfm
|
5.
|
Other useful information describing the "Quality" of the document:
|
|
This specification specifies some important Integrity Check Value standards.
|
6.
|
The degree of stability or maturity of the document:
|
|
SP 800-185 was published in 2016. Current standards status of this document can be found at http://www.csrc.nist.gov/publications/nistpubs/
|
7.
|
Relationship with other existing or emerging documents:
|
|
|
8.
|
Any explicit references within that referenced document should also be listed:
|
|
[1] National Institute of Standards and Technology, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, Federal Information Processing Standards (FIPS) Publication 202, August 2015, 37 pp/
[2] G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, The KECCAK reference, version 3.0, January 14, 2011, 69 pp./
[3] G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, Cryptographic sponge functions, version 0.1, January 14, 2011, 93 pp/
[4] E. Barker, Recommendation for Key Management, Part 1: General, NIST Special Publication (SP) 800-57 Part 1 Revision 4, National Institute of Standards and Technology, January 2016, 160 pp./
|
9.
|
Qualification of
NIST:
|
|
Qualification of NIST: NIST is recognized under the provisions of ITU-T Recommendation A.5. Qualifying information is on file in TSB.
|
10.
|
Other (for any supplementary information):
|
|
|