FW: Document Action: 'US Secure Hash Algorithms (SHA and HMAC-SH A)' to Informational RFC
Eastlake III Donald-LDE008 <Donald.Eastlake@motorola.com> Tue, 07 February 2006 03:26 UTC
From: Eastlake III Donald-LDE008 <Donald.Eastlake@motorola.com>
Subject: FW: Document Action: 'US Secure Hash Algorithms (SHA and HMAC-SH A)' to Informational RFC
Date: Mon, 06 Feb 2006 22:26:10 -0500
Lines: 94
Mime-Version: 1.0
Content-Type: text/plain
X-From: owner-namedroppers@ops.ietf.org Tue Feb 07 04:37:29 2006
Return-path: <owner-namedroppers@ops.ietf.org>
X-Spam-Checker-Version: SpamAssassin 3.1.0 (2005-09-13) on psg.com
X-Spam-Level:
X-Spam-Status: No, score=-2.4 required=5.0 tests=AWL,BAYES_00 autolearn=ham version=3.1.0
To: namedroppers@ops.ietf.org
X-Mailer: Internet Mail Service (5.5.2657.72)
X-Brightmail-Tracker: AAAAAQAAAAQ=
X-White-List-Member: TRUE
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
X-Message-ID:
Message-ID: <20140418072129.2560.78228.ARCHIVE@ietfa.amsl.com>
This draft with SHA-256, etc., code, which is now referenced by more than one draft in DNSEXT, has been approved as Informational. Donald -----Original Message----- From: ietf-announce-bounces@ietf.org [mailto:ietf-announce-bounces@ietf.org] On Behalf Of The IESG Sent: Monday, February 06, 2006 5:05 PM To: IETF-Announce Cc: Internet Architecture Board; RFC Editor Subject: Document Action: 'US Secure Hash Algorithms (SHA and HMAC-SHA)' to Informational RFC The IESG has approved the following document: - 'US Secure Hash Algorithms (SHA and HMAC-SHA) ' <draft-eastlake-sha2-02.txt> as an Informational RFC This document has been reviewed in the IETF but is not the product of an IETF Working Group. The IESG contact person is Russ Housley. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-eastlake-sha2-02.txt Technical Summary NIST has adopted a suite of secure hash algorithms as part of a Federal Information Processing Standard (FIPS) 180-2: SHA-224, SHA-256, SHA-384, and SHA-512. The purpose of this document is to make open source code performing these hash functions conveniently available to the Internet community. The sample code supports input strings of arbitrary bit length. Also, the SHA-1 (from FIPS 180-1) sample code from RFC 3174 has also been updated to handle an input string of arbitrary length. Code to perform SHA-based HMACs is also included. Most of the text in the document was adapted by the authors from FIPS 180-2. Working Group Summary This is an Individual submission. No IETF Working Group was involved. Protocol Quality This document was reviewed by Russ Housley for the IESG. Note to the RFC Editor To resolve the concerns with the term "open source", please make the following changes: In the Abstract: OLD: The purpose of this document is to make open source code performing these hash functions conveniently available to the Internet community. NEW: The purpose of this document is to make source code performing these hash functions conveniently available to the Internet community. In Section 10: OLD: This document is intended to provide convenient open source access by the Internet community to the United States of America Federal Information Processing Standard Secure Hash Algorithms (SHAs) [FIPS 180-2] and HMACs based thereon. NEW: This document provides the Internet community convenient access to source code that implements the United States of America Federal Information Processing Standard Secure Hash Algorithms (SHAs) [FIPS 180-2] and HMACs based upon these one-way hash functions. See license in Section 1.1. _______________________________________________ IETF-Announce mailing list IETF-Announce@ietf.org https://www1.ietf.org/mailman/listinfo/ietf-announce -- to unsubscribe send a message to namedroppers-request@ops.ietf.org with the word 'unsubscribe' in a single line as the message text body. archive: <http://ops.ietf.org/lists/namedroppers/>
- FW: Document Action: 'US Secure Hash Algorithms (… Eastlake III Donald-LDE008