Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

Home : ITU-T Home : ITU-T Work Programme : G.9960     
  ITU-T A.5 justification information for referenced document NIST SP 800-38C in draft G.9960
1. Clear description of the referenced document:
Name: NIST SP 800-38C
Title: Recommendation for Block Cipher Modes of Operation - The CCM Mode for Authentication and Confidentiality
2. Status of approval:
Approved
3. Justification for the specific reference:
The security function uses the CCM mode in [NIST-SP800-38C].
4. Current information, if any, about IPR issues:
Some information may be available in the NIST Patents Database that can be accessed through http://patapsco.nist.gov/ts/220/sharedpatent/index.cfm
5. Other useful information describing the "Quality" of the document:
This NIST document has been produced by Computer Security Division's (CSD) Security Technology Group of NIST has a subgroup that deals specifically with Cryptographic Technology Standards and Guidance (CTSG). CTSG is involved in the development, maintenance, and promotion of a number of standards and guidance that cover a wide range of cryptographic technology. NIST held a public workshop in the fall of 2000, and a second public workshop in the summer of 2001 that both provided input into this particular document. Currently, there are five confidentiality modes of operation that can be used with NIST's current encryption algorithms. NIST is considering developing a variety of symmetric key block cipher modes of operation for use with any current and future approved block cipher algorithms. NIST has long term technical experience in dealing with cryptographic matters. The document has been publicly and internally reviewed before publication.
6. The degree of stability or maturity of the document:
SP 800-38C was published in 2004. Current standards status of this document can be found at http://www.csrc.nist.gov/publications/nistpubs/
7. Relationship with other existing or emerging documents:
NIST is actively involved in standardization of cryptographic techniques. The crypto tools are of wide general applicability (see e.g. DES, AES, modes of operation and guidelines). NIST continues its research and standardization in the area of modes of operation. Special Publication 800-38B will specify an authentication mode and draft Special Publication 800-38C will specify the CCM mode of the AES algorithm. NIST also expects to publish a new edition of SP 800-38A in which the domain of the CBC mode is extended (to include plaintexts whose bit lengths are not a multiple of the block size); all of the technical material that is specified in the 2001 edition is expected to remain valid. NIST continues to accept modes proposals.
8. Any explicit references within that referenced document should also be listed:
[1] D. Whiting, R. Housley, N. Ferguson, Counter with CBC-MAC (CCM). Available at http://csrc.nist.gov/ CryptoToolkit/modes/proposedmodes/./
[2] FIPS Publication 197, Advanced Encryption Standard (AES). U.S. DoC/NIST, November 26, 2001. Available at http://csrc.nist.gov/publications/./
[3] FIPS Publication 46-3, Data Encryption Standard (DES). U.S. DoC/NIST, October 25, 1999. Available at http://csrc.nist.gov/publications/./
[4] Institute of Electrical and Electronics Engineers, Inc., IEEE Std. 802.11i/D7.0, Draft Amendment to Standard for Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements, October 2003./
[5] Institute of Electrical and Electronics Engineers, Inc., IEEE Std. 802.11-1999, IEEE Standard for Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications, New York: IEEE Press, 1999./
[6] NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation – Methods and Techniques. U.S. DoC/NIST, December 2001. Available at http://csrc.nist.gov/publications/./
[7] Draft NIST Special Publication 800-38B, Recommendation for Block Cipher Modes of Operation: the CMAC Authentication Mode. U.S. DoC/NIST, October 2003. Available at http://csrc.nist.gov/CryptoToolkit/modes./
[8] J. Jonsson, On the Security of CTR + CBC-MAC, in Proceedings of Selected Areas in Cryptography – SAC, 2002, K. Nyberg, H. Heys, Eds., Lecture Notes in Computer Science, Vol. 2595, pp. 76-93, Berlin: Springer, 2002./
[9] P. Rogaway and D. Wagner, A Critique of CCM. Cryptology ePrint Archive: Report 2003/070, April, 2003. Available at http://eprint.iacr.org/2003/070/.
9. Qualification of NIST:
Qualification of NIST: NIST is recognized under the provisions of ITU-T Recommendation A.5. Qualifying information is on file in TSB.
10. Other (for any supplementary information):
Note: This form is based on Recommendation ITU-T A.5