Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST SP 800-131A Rev. 3 (Initial Public Draft)

Transitioning the Use of Cryptographic Algorithms and Key Lengths

Date Published: October 21, 2024
Comments Due: December 4, 2024 (public comment period is CLOSED)
Email Questions to: sp800-131a_comments@nist.gov

Planning Note (01/17/2025):

The file of public comments received has been updated.


Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST)

Announcement

NIST provides cryptographic key management guidance for defining and implementing appropriate key-management procedures, using algorithms that adequately protect sensitive information, and planning for possible changes in the use of cryptography because of algorithm breaks or the availability of more powerful computing techniques. This publication provides guidance on transitioning to the use of stronger cryptographic keys and more robust algorithms.

This revision proposes a) the retirement of ECB as a confidentiality mode of operation and the use of DSA for digital signature generation and b) a schedule for the retirement of SHA-1 and the 224-bit hash functions. This draft also discusses the transition from a security strength of 112 bits to a 128-bit security strength and to quantum-resistant algorithms for digital signatures and key establishment.

NOTE: A call for patent claims is included on page iii of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy  Inclusion of Patents in ITL Publications.

Abstract

Keywords

cryptographic algorithm; digital signature; elliptic curves; encryption; entropy; extendable output functions; hash function; key agreement; key-derivation functions; key encapsulation; key transport; key wrapping; message authentication codes; quantum-resistant algorithms; random bit generation; security strength; transition
Control Families

None selected

Documentation

Publication:
https://doi.org/10.6028/NIST.SP.800-131Ar3.ipd
Download URL

Supplemental Material:
Public comments received (pdf)

Document History:
10/21/24: SP 800-131A Rev. 3 (Draft)