Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Commercial National Security Algorithm Suite

From Wikipedia, the free encyclopedia
Set of cryptographic algorithms by the NSA

TheCommercial National Security Algorithm Suite (CNSA) is a set of cryptographic algorithmspromulgated by theNational Security Agency as a replacement forNSA Suite B Cryptography algorithms. It serves as the cryptographic base to protect US National Security Systems information up to thetop secret level, while the NSA plans for a transition toquantum-resistant cryptography.[1][2][3][4][5][6]

Timeline for the transition to CNSA 2.0

The 1.0 suite included:

The CNSA transition is notable for movingRSA from a temporarylegacy status, as it appeared in Suite B, tosupported status. It also did not include theDigital Signature Algorithm. This, and the overall delivery and timing of the announcement, in the absence of post-quantum standards, raised considerable speculation about whether NSA had found weaknesses e.g. in elliptic-curve algorithms or others, or was trying to distance itself from an exclusive focus on ECC for non-technical reasons.[7][8][9]

Version 2.0 Announcement

[edit]

In September 2022, the NSA announced CNSA 2.0, which includes its first recommendations for post-quantum cryptographic algorithms.[10]

CNSA 2.0 includes:[2]

Note that compared to CNSA 1.0, CNSA 2.0:

  • Suggests separate post-quantum algorithms (XMSS/LMS) for software/firmware signing for use immediately
  • Allows SHA-512
  • Announced the selection of CRYSTALS-Kyber and CRYSTALS-Dilithium early, with the expectation that they will be mandated only when the final standards and FIPS-validated implementations are released.
    • RSA, Diffie-Hellman, and elliptic curve cryptography will be deprecated at that time.

The CNSA 2.0 and CNSA 1.0 algorithms, detailed functions descriptions, specifications, and parameters are below:[11]

CNSA 2.0

AlgorithmFunctionSpecificationParameters
Advanced Encryption Standard (AES)Symmetric block cipher for information protectionFIPS PUB 197Use 256-bit keys for all classification levels.
Module-Lattice-Based Key-Encapsulation Mechanism Standard (ML-KEM aka CRYSTALS-Kyber)Asymmetric algorithm for key establishmentFIPS PUB 203Use ML-KEM-1024 parameter set for all classification levels.
Module-Lattice-Based Digital Signature Standard (aka CRYSTALS-Dilithium)Asymmetric algorithm for digital signaturesFIPS PUB 204Use ML-DSA-87 parameter set for all classification levels.
Secure Hash Algorithm (SHA)Algorithm for computing a condensed representation of informationFIPS PUB 180-4Use SHA-384 or SHA-512 for all classification levels.
Leighton-Micali Signature (LMS)Asymmetric algorithm for digitally signing firmware and softwareNIST SP 800-208All parameters approved for all classification levels. SHA256/192 recommended.
Xtended Merkle Signature Scheme (XMSS)Asymmetric algorithm for digitally signing firmware and softwareNIST SP 800-208All parameters approved for all classification levels.

CNSA 1.0

AlgorithmFunctionSpecificationParameters
Advanced Encryption Standard (AES)Symmetric block cipher for information protectionFIPS PUB 197Use 256-bit keys for all classification levels.
Elliptic Curve Diffie-Hellman (ECDH) Key ExchangeAsymmetric algorithm for key establishmentNIST SP 800-56AUse Curve P-384 for all classification levels.
Elliptic Curve Digital Signature Algorithm (ECDSA)Asymmetric algorithm for digital signaturesFIPS PUB 186-4Use Curve P-384 for all classification levels.
Secure Hash Algorithm (SHA)Algorithm for computing a condensed representation of informationFIPS PUB 180-4Use SHA-384 for all classification levels.
Diffie-Hellman (DH) Key ExchangeAsymmetric algorithm for key establishmentIETF RFC 3526Minimum 3072-bit modulus for all classification levels
[Rivest-Shamir-Adleman] RSAAsymmetric algorithm for key establishmentFIPS SP 800-56BMinimum 3072-bit modulus for all classification levels
[Rivest-Shamir-Adleman] RSAAsymmetric algorithm for digital signaturesFIPS PUB 186-4Minimum 3072-bit modulus for all classification levels

References

[edit]
  1. ^Cook, John (2019-05-23)."NSA recommendations | algorithms to use until PQC".www.johndcook.com. Retrieved2020-02-28.
  2. ^abc"Announcing the Commercial National Security Algorithm Suite 2.0"(PDF).media.defense.gov. 2022-09-07. Archived fromthe original(PDF) on September 8, 2022. Retrieved2024-06-10.
  3. ^"CNSA Suite and Quantum Computing FAQ"(PDF).cryptome.org. January 2016. Retrieved24 July 2023.
  4. ^"Use of public standards for the secure sharing of information among national security systems, Advisory Memorandum 02-15 CNSS Advisory Memorandum Information Assurance 02-15".Committee on National Security Systems. 2015-07-31. Archived fromthe original on 2020-02-28. Retrieved2020-02-28.
  5. ^"Commercial National Security Algorithm Suite".apps.nsa.gov. 19 August 2015. Archived fromthe original on 2022-02-18. Retrieved2020-02-28.
  6. ^Housley, Russ; Zieglar, Lydia (July 2018)."RFC 8423 - Reclassification of Suite B Documents to Historic Status".tools.ietf.org. Retrieved2020-02-28.
  7. ^"NSA's FAQs Demystify the Demise of Suite B, but Fail to Explain One Important Detail – Pomcor". 9 February 2016. Retrieved2020-02-28.
  8. ^"A riddle wrapped in a curve".A Few Thoughts on Cryptographic Engineering. 2015-10-22. Retrieved2020-02-28.
  9. ^Koblitz, Neal; Menezes, Alfred J. (2018-05-19)."A Riddle Wrapped in an Enigma".Cryptology ePrint Archive.
  10. ^"Post-Quantum Cybersecurity Resources".www.nsa.gov. Retrieved2023-03-03.
  11. ^"Announcing the Commercial National Security Algorithm Suite 2.0, U/OO/194427-22, PP-22-1338, Ver. 1.0"(PDF).media.defense.gov.National Security Agency. September 2022. Table IV: CNSA 2.0 algorithms, p. 9.; Table V: CNSA 1.0 algorithms, p. 10. Archived fromthe original(PDF) on September 8, 2022. Retrieved2024-04-14.
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
Algorithms
Integer factorization
Discrete logarithm
Lattice/SVP/CVP/LWE/SIS
Others
Theory
Standardization
Topics
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics


Stub icon

This cryptography-related article is astub. You can help Wikipedia byexpanding it.

Retrieved from "https://en.wikipedia.org/w/index.php?title=Commercial_National_Security_Algorithm_Suite&oldid=1297033940"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp