Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Commercial National Security Algorithm Suite

From Wikipedia, the free encyclopedia
Set of cryptographic algorithms by the NSA
Timeline for the transition to CNSA 2.0

TheCommercial National Security Algorithm Suite (CNSA) is a set of cryptographic algorithmspromulgated by theNational Security Agency as a replacement forNSA Suite B Cryptography algorithms. It serves as the cryptographic base to protect US National Security Systems information up to theTOP SECRET level. Two versions of CNSA exist: the pre-quantum 1.0 of 2015 and thequantum-resistant 2.0 of 2022.[1][2][3][4][5][6]

Contents

[edit]

CNSA 1.0

[edit]

A singular parameter length is provided for protection up to TOP SECRET level.

Components of CNSA 1.0
PurposeAlgorithmStandardParameter LengthBits of SecurityNotes
Symmetric encryptionAESFIPS 197256256
Digital SignatureElliptic Curve Digital Signature Algorithm (ECDSA)FIPS 186-4384192Use curveP-384 only.
RSAFIPS 186-43072128Minimum modulus size, can be larger.
Key agreementElliptic-curve Diffie–Hellman (ECDH)NIST SP 800-56Ar3384192Use curveP-384 only.
Diffie–Hellman key exchangeRFC 35263072128Minimum modulus size, can be larger.
RSAFIPS SP 800-56Br23072128Minimum modulus size, can be larger.
Message digestSHA-2FIPS 180-4384192Use exactly SHA-384.

The CNSA 1.0 transition is notable for movingRSA from a temporarylegacy status, as it appeared in Suite B, tosupported status. It also did not include theDigital Signature Algorithm. This, and the overall delivery and timing of the announcement, in the absence of post-quantum standards, raised considerable speculation about whether NSA had found weaknesses e.g. in elliptic-curve algorithms or others, or was trying to distance itself from an exclusive focus on ECC for non-technical reasons.[7][8][9]

Documents describing the integration of CNSA 1.0 with Internet protocols include:

  • RFC 9151 Commercial National Security Algorithm (CNSA) Suite Profile for TLS and DTLS 1.2 and 1.3
  • RFC 9206 Commercial National Security Algorithm (CNSA) Suite Cryptography for Internet Protocol
  • RFC 9212 Commercial National Security Algorithm (CNSA) Suite Cryptography for Secure Shell (SSH)
  • RFC 8755 Using Commercial National Security Algorithm Suite Algorithms in Secure/Multipurpose
  • RFC 8756 Commercial National Security Algorithm (CNSA) Suite Profile of Certificate Management over CMS
  • RFC 8603 Commercial National Security Algorithm (CNSA) Suite Certificate and Certificate Revocation List (CRL) Profile

CNSA 2.0

[edit]

In September 2022, the NSA announced CNSA 2.0, which includes its first recommendations for post-quantum cryptographic algorithms. Again, all parameters are provided for classified information up to TOP SECRET level.[10]

Components of CNSA 2.0[11]
PurposeAlgorithmStandardParameter LengthBits of SecurityNotes
Symmetric encryptionAESFIPS 197-upd1256256
Key agreementML-KEMFIPS 203ML-KEM-1024256
Digital signatureML-DSAFIPS 204ML-DSA-87256
Message digest of dataSHA-2FIPS 180-4384 or 512192 or 256
Digital signature of firmware and softwareLeighton-MicaliNIST SP 800-208192 or 256192 or 256All standard parameter sets are approved, the minimum being SHA256/192. SHA256/192 is the recommended choice.
Xtended MerkleNIST SP 800-208192 or 256192 or 256All standard parameter sets are approved, the minimum being SHA256/192.

Note that compared to CNSA 1.0, CNSA 2.0:

  • Suggests separate post-quantum algorithms (XMSS/LMS) for software/firmware signing for use immediately
  • Allows SHA-512
  • Announced the selection of CRYSTALS-Kyber and CRYSTALS-Dilithium early, with the expectation that they will be mandated only when the final standards and FIPS-validated implementations are released. RSA, Diffie-Hellman, and elliptic curve cryptography will be deprecated at that time.

Documents describing the integration of CNSA 2.0 with Internet protocols include:

  • draft-becker-cnsa2-smime-profile-01 Commercial National Security Algorithm (CNSA) Suite Profile for Secure/Multipurpose Internet Mail Extensions (S/MIME)
  • draft-becker-cnsa2-ssh-profile-02 Commercial National Security Algorithm (CNSA) Suite Profile for SSH
  • draft-becker-cnsa2-tls-profile-02 Commercial National Security Algorithm (CNSA) Suite Profile for TLS 1.3
  • draft-guthrie-cnsa2-ipsec-profile-01 Commercial National Security Algorithm (CNSA) Suite 2.0 Profile for IPsec
  • draft-jenkins-cnsa2-cmc-profile-01 Commercial National Security Algorithm (CNSA) Suite Profile of Certificate Management over CMS
  • draft-jenkins-cnsa2-pkix-profile-03 Commercial National Security Algorithm Suite Certificate and Certificate Revocation List Profile

References

[edit]
  1. ^Cook, John (2019-05-23)."NSA recommendations | algorithms to use until PQC".www.johndcook.com. Retrieved2020-02-28.
  2. ^"Announcing the Commercial National Security Algorithm Suite 2.0"(PDF).United States Department of Defense. 2022-09-07. Archived fromthe original(PDF) on September 8, 2022. Retrieved2024-06-10.
  3. ^"CNSA Suite and Quantum Computing FAQ"(PDF).cryptome.org. January 2016. Retrieved24 July 2023.
  4. ^"Use of public standards for the secure sharing of information among national security systems, Advisory Memorandum 02-15 CNSS Advisory Memorandum Information Assurance 02-15".Committee on National Security Systems. 2015-07-31. Archived fromthe original on 2020-02-28. Retrieved2020-02-28.
  5. ^"Commercial National Security Algorithm Suite".apps.nsa.gov. 19 August 2015. Archived fromthe original on 2022-02-18. Retrieved2020-02-28.
  6. ^Housley, Russ; Zieglar, Lydia (July 2018)."RFC 8423 - Reclassification of Suite B Documents to Historic Status".tools.ietf.org. Retrieved2020-02-28.
  7. ^"NSA's FAQs Demystify the Demise of Suite B, but Fail to Explain One Important Detail – Pomcor". 9 February 2016. Retrieved2020-02-28.
  8. ^"A riddle wrapped in a curve".A Few Thoughts on Cryptographic Engineering. 2015-10-22. Retrieved2020-02-28.
  9. ^Koblitz, Neal; Menezes, Alfred J. (2018-05-19)."A Riddle Wrapped in an Enigma".Cryptology ePrint Archive.
  10. ^"Post-Quantum Cybersecurity Resources".www.nsa.gov. Retrieved2023-03-03.
  11. ^"Announcing the Commercial National Security Algorithm Suite 2.0, U/OO/194427-22, PP-22-1338, Ver. 1.0"(PDF).United States Department of Defense.National Security Agency. May 2025. Table IV: CNSA 2.0 algorithms, p. 9.; Table V: CNSA 1.0 algorithms, p. 10. Retrieved2026-01-26.{{cite web}}: CS1 maint: url-status (link)
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
Algorithms
Integer factorization
Discrete logarithm
Lattice/SVP/CVP/LWE/SIS
Others
Theory
Standardization
Topics
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics


Stub icon

This cryptography-related article is astub. You can help Wikipedia byadding missing information.

Retrieved from "https://en.wikipedia.org/w/index.php?title=Commercial_National_Security_Algorithm_Suite&oldid=1335973505"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp