Notice: Information Processing Standards, Federal: Withdrawal of FIPS 46-3, Fips 74, and FIPS 81

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Federal Register / Vol. 70, No.

96 / Thursday, May 19, 2005 / Notices 28907

conducted extensive studies of patent- 6. When a merger or acquisition DEPARTMENT OF COMMERCE


related activity and the operation of the involves one or more firms in a
patent system, and issued reports regulated industry, how should National Institute of Standards and
including recommendations for reform. authority for merger review be allocated Technology
See Stephen A. Merrill, Richard C. between the antitrust agencies (DOJ and [Docket No. 040602169–5002–02]
Levin & Mark B. Myers, A Patent System FTC) and the relevant regulatory
for the 21st Century (2004); Federal agency? Announcing Approval of the
Trade Commission, To Promote a. Are there additional costs and delay Withdrawal of Federal Information
Innovation: The Proper Balance of when two agencies (one antitrust, one Processing Standard (FIPS) 46–3, Data
Competition and Patent Law and Policy regulatory) both analyze the antitrust Encryption Standard (DES); FIPS 74,
(Oct. 2003). effects of the same merger? Are there Guidelines for Implementing and Using
1. Do the reports fully capture the role benefits to such dual review? the NBS Data Encryption Standard;
of patents and developments in patent- b. Should regulatory agencies defer to and FIPS 81, DES Modes of Operation
related activity (e.g., applications, antitrust analysis by the antitrust
grants, licensing, and litigation) over the agencies, or should both the antitrust AGENCY: National Institute of Standards
past 25 years? and regulatory agencies conduct and Technology (NIST), Commerce.
2. Are the concerns or problems separate antitrust analyses in ACTION: Notice.
regarding the operation of the patent performing merger reviews? Should the
antitrust agencies have primary SUMMARY: The Secretary of Commerce
system identified in the two reports
well-founded? responsibility or simply an advisory role has approved the withdrawal of FIPS
with respect to antitrust analysis in 46–3, Data Encryption Standard (DES);
3. Which, if any, of the
merger review? FIPS 74, Guidelines for Implementing
recommendations for changes to the
In your response, please refer and Using the NBS Data Encryption
patent system made in those two reports
specifically to the following contexts: Standard; and FIPS 81, DES Modes of
should be adopted?
i. Mergers or acquisitions involving Operation. These FIPS are withdrawn
4. Are there other issues regarding the
financial institutions. See 12 U.S.C. because FIPS 46–3, DES, no longer
operation of the patent system not
1467a, 1828, 1842. provides the security that is needed to
addressed in either report that should be
ii. Mergers or acquisitions involving protect Federal government information.
considered by the Antitrust
certain media companies (e.g., radio or FIPS 74 and 81 are associated standards
Modernization Commission? Please be
television broadcasters, satellite, and that provide for the implementation and
specific in identifying any issue and the
cable companies) and common carriers. operation of the DES. Federal
reasons for its importance.
See 47 U.S.C. 214, 310. government organizations are now
IX. Regulated Industries iii. Mergers or acquisitions of rail encouraged to use FIPS 197, Advanced
1. What role, if any, should antitrust carriers subject to approval by the Encryption Standard (AES), which was
enforcement play in regulated Surface Transportation Board. See 49 approved for Federal government use in
industries, particularly industries in U.S.C. 11321, 11323–24. November 2001. FIPS 197 specifies a
transition to deregulation? How should iv. Mergers or acquisitions involving faster and stronger algorithm than the
authority be allocated between antitrust motor carriers of passengers. See 49 DES for encryption. For some
enforcers and regulatory agencies to best U.S.C. 14303. applications, Federal government
promote consumer welfare in regulated v. Pooling agreements among certain departments and agencies may use the
industries? motor carriers. See 49 U.S.C. 14302. Triple Data Encryption Algorithm to
vi. Certain agreements involving provide cryptographic protection for
2. How, if at all, should antitrust
domestic and foreign airlines. See 49 their information. This algorithm and its
enforcement take into account
U.S.C. 41308–09. vii. Acquisitions of uses have been specified in NIST
regulatory systems affecting important
assets of natural gas companies. See 15 Special Publication 800–67,
competitive aspects of an industry?
U.S.C. 717f. Recommendations for the Triple Data
How, if at all, should regulatory
viii. Mergers or acquisitions of electric Encryption Algorithm (TDEA) Block
agencies take into account the
power companies. See 16 U.S.C. 824b. Cipher, issued in May 2004. FIPS 197
availability of antitrust remedies?
ix. License applications subject to the and SP 800–67 are available on NIST’s
3. What is the appropriate standard
approval of the U.S. Nuclear Regulatory Web pages. The content of these
for determining the extent to which the
Commission. See 42 U.S.C. 2135. withdrawn standards will remain
antitrust laws apply to regulated
x. Issuance of federal coal leases. See available at http://csrc.nist.gov/
industries where the regulatory
30 U.S.C. 184(l). publications/fips/index.html as
structure contains no specific antitrust
xi. Issuance or transfer of licenses for reference documents and these three
exemption? For example, in what
exploration of hard minerals in deep FIPS will be listed as withdrawn, rather
circumstances should antitrust
seabed sites. See 30 U.S.C. 1413(d). than current FIPS.
immunity be implied as a result of a
xii. Issuance of oil and gas leases on DATES: These standards are withdrawn
regulatory structure?
submerged lands of the Outer as of May 19, 2005.
4. How should courts treat antitrust Continental Shelf. See 43 U.S.C.
claims where the relevant conduct is FOR FURTHER INFORMATION CONTACT: Mr.
1337(c). William Barker (301) 975–8443,
subject to regulation, but the regulatory
legislation contains a ‘‘savings clause’’ Dated: May 16, 2005. wbarker@nist.gov, National Institute of
providing that the antitrust laws By direction of the Antitrust Standards and Technology, 100 Bureau
continue to apply to the conduct? Modernization Commission. Drive, STOP 8930, Gaithersburg, MD
5. Should Congress and regulatory Andrew J. Heimert, 20899–8930.
agencies set industry-specific standards Executive Director & General Counsel, SUPPLEMENTARY INFORMATION: In July
for particular antitrust violations that Antitrust Modernization Commission. 2004, a notice was published in the
may conflict with general standards for [FR Doc. 05–10025 Filed 5–18–05; 8:45 am] Federal Register proposing the
the same violations? BILLING CODE 6820–YM–P withdrawal of FIPS 46–3, DES; FIPS 74,

VerDate jul<14>2003 22:14 May 18, 2005 Jkt 205001 PO 00000 Frm 00007 Fmt 4703 Sfmt 4703 E:\FR\FM\19MYN1.SGM 19MYN1
28908 Federal Register / Vol. 70, No. 96 / Thursday, May 19, 2005 / Notices

Guidelines for Implementing and Using of the recommended action to withdraw of files, and for the security of digital
the NBS Data Encryption Standard; and FIPS 46–3 and two associated standards. television signals. The standards should
FIPS 81, DES Modes of Operation. The Comment: NIST should retain the be reaffirmed for use by non-
Federal Register notice solicited availability of the technique in FIPS 74 government organizations or made
comments from the public, academic that specifies the encryption of numeric available in electronic form to non-
and research communities, data into numeric data. This technique government organizations that wish to
manufacturers, voluntary standards is used to protect customer data that a use them.
organizations, and Federal, state, and bank might share with a telemarketing
local government organizations. In firm. Response: The specifications for FIPS
addition to being published in the Response: NIST will place FIPS 74, 46–3 (DES) and the associated standards
Federal Register, the notice was posted Guidelines for Implementing and Using will be placed on NIST’s Web page at
on the NIST Web site. the NBS Data Encryption Standard, on http://www.itl.nist.gov/fipspubs/ under
Comments and questions were NIST’s Web page at http:// Withdrawn FIPS. All of the withdrawn
received from thirteen private sector www.itl.nist.gov/fipspubs/ under standards will be marked as inadequate
organizations or individuals, and two Withdrawn FIPS. The standard will be for the protection of Federal government
federal government organizations. Seven marked as inadequate for the protection information, but will be available to
of the submitted comments supported of Federal government information. private sector organizations that wish to
the withdrawal of the DES. Five Comment: NIST should provide a use them.
comments recognized the inadequacy of timetable and a transition strategy for
the discontinuation of the use of DES Comment: NIST should issue the
the DES and did not oppose the Triple-DES as a FIPS and encourage
withdrawal, but raised transition issues implementations. NIST should clarify
the transition from the use of applied implementers to use both the TDES and
or suggested that NIST keep the the Advanced Encryption Standard in
and embedded DES products.
specifications available for private their products.
Response: A proposed transition
sector organizations that wish to use strategy for validating algorithms and
them or make provisions for continued Response: Although both AES and
cryptographic modules has been posted three-key TDES are considered adequate
use of the DES. One industry for public comment on NIST’s Web page
organization and two individuals for the protection of Federal government
at http://csrc.nist.gov/cryptval/ under information for many years, TDES is
opposed the withdrawal of the DES, ‘‘Notices.’’ The transition plan addresses
citing the large investments made in less efficient and is slightly less secure
the use by Federal agencies of DES
DES technology by their organizations than AES. In order to encourage the use
implementations, which are
and others. of AES over TDES, AES has been
incorporated in cryptographic modules,
Following is an analysis of the and which have been validated under published as a Standard (FIPS 197),
comments dealing with technical and the Cryptographic Module Validation whereas TDES was published as a NIST
transition issues. Program. The transition plan allows Recommendation (Special Publication
Comment: NIST should consider Federal agencies and vendors to make a 800–67).
allowing the continued use of DES smooth transition to stronger Therefore, as of the date of this
implementations that only decrypt data, cryptographic algorithms such as AES Federal Register notice, FIPS 46–3, Data
enabling agencies to recover the data or Triple-DES. Encryption Standard is withdrawn as it
that they have already encrypted using Comment: The DES should be no longer provides the security that is
the DES. retained because it is widely used in the needed to protect Federal government
Response: NIST guidance contained market. information. FIPS 74, Guidelines for
in draft Special Publication 800–57, Response: NIST believes that the DES Implementing and Using the NBS
Recommendation for Key Management, no longer provides adequate protection
Part 1 General Guideline, covers this Encryption Standard and FIPS 81, DES
for Federal government information,
situation. SP 800–57 expands on Modes of Operation, are also
and therefore recommends withdrawal
guidance issued in Special Publication withdrawn, as they are associated
of FIPS 46–3 and associated standards.
800–21, Guideline for Implementing When FIPS 46–3 was reaffirmed in standards that provide for the
Cryptography in the Federal 1999, the standard stated that NIST implementation and operation of the
Government, and recommends that could no longer support the use of DES.
agencies re-encrypt information that had single DES for many applications, and Authority: Federal Information Processing
been encrypted using an algorithm and that agencies with legacy single DES Standards Publications (FIPS PUBS) are
key size that no longer provide adequate systems should start the transition to issued by the National Institute of Standards
protection. Thus, Federal government Triple DES. The specifications for the and Technology after approval by the
information that has been encrypted standards that have been withdrawn Secretary of Commerce pursuant to Section
with the DES should be re-encrypted will be placed on NIST’s Web page at 5131 of the Information Technology
using a FIPS-approved algorithm and an http://www.itl.nist.gov/fipspubs/ under Management Reform Act of 1996 and the
appropriate key size that agencies Withdrawn FIPS. All of the withdrawn Federal Information Security Management
determine will provide adequate standards will be marked as inadequate Act of 2002, Public Law 107–347.
security for the information for the for the protection of Federal government
remainder of its life. information, but will be available to E.O. 12866: This notice has been
Comment: NIST should note certain private sector organizations that wish to determined to be significant for the
limits that might be reached when using use them. purposes of E. O. 12866.
two-key Triple DES. The recommended Comment: FIPS 46–3 and associated Dated: May 12, 2005.
safe default when using two-key Triple- standards are used in the commercial Hratch G. Semerjian,
DES is to re-key before encrypting 240 world and serve important functions,
Acting Director, NIST.
blocks. including use by the entertainment
[FR Doc. 05–9945 Filed 5–18–05; 8:45 am]
Response: These specific applications industry for real-time broadcast
and requirements are outside the scope security, to prevent unrestricted copying BILLING CODE 3510–CN–P

VerDate jul<14>2003 22:14 May 18, 2005 Jkt 205001 PO 00000 Frm 00008 Fmt 4703 Sfmt 4703 E:\FR\FM\19MYN1.SGM 19MYN1

You might also like