Content deleted Content added
m Duplicate word removed |
Citation bot (talk | contribs) Alter: title. | You can use this bot yourself. Report bugs here. | Activated by Zppix | Category:Cryptography stubs | via #UCB_Category |
||
Line 1:
The '''Commercial National Security Algorithm Suite''' (CNSA) is a set of cryptographic algorithms [[Promulgation|promulgated]] by the [[National Security Agency]] as a replacement for [[NSA Suite B Cryptography]] algorithms. It serves as the cryptographic base to protect US National Security Systems information up to the [[top secret]] level, while the NSA plans for a transition to [[quantum-resistant cryptography]].<ref>{{Cite web|url=https://www.johndcook.com/blog/2019/05/23/nsa-recommendations/|title=NSA recommendations {{!}} algorithms to use until PQC|last=Cook|first=John|date=2019-05-23|website=www.johndcook.com|url-status=live|archive-url=|archive-date=|access-date=2020-02-28}}</ref><ref name=":0">{{Cite web|url=https://apps.nsa.gov/iaarchive/library/ia-guidance/ia-solutions-for-classified/algorithm-guidance/commercial-national-security-algorithm-suite-factsheet.cfm|title=Commercial National Security Algorithm (CNSA) Suite Factsheet|last=|first=|date=2015-12-30|website=apps.nsa.gov|language=en|url-status=live|archive-url=|archive-date=|access-date=2020-02-28}}</ref><ref>https://cryptome.org/2016/01/CNSA-Suite-and-Quantum-Computing-FAQ.pdf</ref><ref>{{Cite web|url=https://www.cnss.gov/CNSS/issuances/Memoranda.cfm|title=Use of public standards for the secure sharing of information among national security systems, Advisory Memorandum 02-15
The suite includes
Line 8:
* [[RSA (cryptosystem)|RSA]] with a minimum modulus size of 3072.<ref name=":0" />
The CNSA transition is notable for moving [[RSA (cryptosystem)|RSA]] from a temporary ''legacy'' status, as it appeared in Suite B, to ''supported'' status. It also did not include the [[Digital Signature Algorithm]]. This, and the overall delivery and timing of the announcement, in the absence of post-quantum standards, raised considerable speculation about whether NSA had found weaknesses e.g. in elliptic-curve algorithms or others, or was trying to distance itself from an exclusive focus on ECC for non-technical reasons.<ref>{{Cite web|url=https://pomcor.com/2016/02/09/nsas-faqs-demystify-the-demise-of-suite-b-but-fail-to-explain-one-important-detail/|title=
== References ==
|