Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

Cryptographic Algorithms and Key Sizes for Personal Identity Verification (Working Draft)

Development Version for PQC

Authors
Affiliations
National Institute of Standards and Technology
National Institute of Standards and Technology

Abstract

Federal Information Processing Standard 201-3 (FIPS 201-3) defines the requirements for Personal Identity Verification (PIV) life cycle activities, including identity proofing, registration, PIV Card issuance, and PIV Card usage. FIPS 201-3 also defines the structure of an identity credential that includes cryptographic keys. This document contains the technical specifications needed for the mandatory and optional cryptographic keys specified in FIPS 201-3, as well as the supporting infrastructure specified in FIPS 201-3 and the related NIST Special Publication (SP) 800-73, Interfaces for Personal Identity Verification, and SP 800-76, Biometric Specifications for Personal Identity Verification, which rely on cryptographic functions.

Keywords:cryptographic algorithmFIPS 201identity credentialPersonal Identity VerificationPIVsmart cards

1Introduction

Homeland Security Presidential Directive-12 (HSPD-12) mandated the creation of new standards for interoperable identity credentials for physical and logical access to Federal Government locations and systems. Federal Information Processing Standard 201 (FIPS 201), Personal Identity Verification (PIV) of Federal Employees and Contractors, was developed to establish standards for identity credentials 2. This document, NIST Special Publication (SP) 800-78-5, specifies the cryptographic algorithms and key sizes for PIV systems and is a companion document to FIPS 201-3.

1.1Scope

The scope of this recommendation encompasses the PIV Card, infrastructure components that support issuance and management of the PIV Card, and applications that rely on the credentials supported by the PIV Card to provide security services. This recommendation identifies acceptable symmetric and asymmetric encryption algorithms, digital signature algorithms, key establishment schemes, and message digest algorithms and specifies mechanisms to identify the algorithms associated with PIV keys or digital signatures.

Algorithms and key sizes have been selected for consistency with applicable federal standards and to ensure adequate cryptographic strength for PIV applications.

1.2Audience and Assumptions

This document is intended for federal agencies and implementers of PIV systems. Readers are assumed to have a working knowledge of cryptography and public key infrastructure (PKI) technology.

1.3Document Overview

The document is organized as follows:

2Application of Cryptography in FIPS 201-3

FIPS 201-3 employs cryptographic mechanisms to authenticate cardholders, secure information stored on the PIV Card, and secure the supporting infrastructure. FIPS 201-3 and its supporting documents specify a suite of keys to be stored on the PIV Card for personal identity verification, digital signature generation, and key management. The PIV cryptographic keys specified in FIPS 201-3 and SP 800-73 are:

The cryptographic algorithms, key sizes, and parameters that may be used for these keys are specified in Section 3.1. PIV Cards must implement private key computations for one or more of the algorithms identified in this section.

Cryptographically protected objects specified in FIPS 201-3, SP 800-73, and SP 800-76 include:

Section 3.2 specifies the cryptographic algorithms, key sizes, and parameters that may be used to protect these objects. Certification authorities (CA) and card management systems that protect these objects must support one or more of the cryptographic algorithms, key sizes, and parameters specified in Section 3.2.

Applications may be designed to use any or all of the cryptographic keys and objects stored on the PIV Card. Where maximum interoperability is required, applications should support all of the identified algorithms, key sizes, and parameters specified in Section 3.1 and Section 3.2.

FIPS 201-3 requires CAs and Online Certificate Status Protocol (OCSP) responders to generate and distribute digitally signed certificate revocation lists (CRL) and OCSP status messages, respectively. These certificate status mechanisms support validation of the PIV Card, the PIV cardholder, the cardholder’s digital signature key, and the cardholder’s key management key.

The signed certificate status mechanisms specified in FIPS 201-3 are:

The cryptographic algorithms, key sizes, and parameters that may be used to sign these mechanisms are specified in Section 4, which also describes rules for encoding the signatures to ensure interoperability.

FIPS 201-3 permits optional card management operations. These operations may only be performed after the PIV Card authenticates the card management system. Card management systems are authenticated through the use of PIV Card Application Administration Keys. The cryptographic algorithms and key sizes that may be used for these keys are specified in Section 5.

3On-Card Cryptographic Requirements

FIPS 201-3 identifies a suite of objects that are stored on the PIV Card for use in authentication mechanisms or other security protocols. These objects may be divided into three classes: cryptographic keys, signed authentication information stored on the PIV Card, and message digests of information stored on the PIV Card. Cryptographic requirements for PIV keys are detailed in Section 3.1. Cryptographic requirements for other stored objects are detailed in Section 3.2.

3.1PIV Cryptographic Keys

FIPS 201-3 and SP 800-73 specify six types of cryptographic keys to be used as credentials by the PIV cardholder:

  1. The mandatory PIV Authentication key,

  2. The mandatory asymmetric Card Authentication key,

  3. An optional symmetric Card Authentication key (deprecated),

  4. A conditionally mandatory digital signature key,

  5. A conditionally mandatory key management key,[1] and

  6. An optional asymmetric key to establish session keys for secure messaging and to authenticate the cardholder using the SM-AUTH authentication mechanism.

All cryptographic algorithms employed shall provide at least 112 bits of security strength. Cryptographic keys that will remain in use after 2030 should provide 128 bits of security strength.[2] Federal departments and agencies should consider potential cryptographic key length migrations as part of their moderate to long-term cryptographic transition and modernization plans, including the need to plan and invest for a future migration to post-quantum algorithms. Capital investments for PIV issuance and relying party systems should be selected with an emphasis on ensuring a timely migration to post-quantum algorithms once standards, technologies, and services are available. If a migration to longer cryptographic keys would require significant resources or infrastructure upgrades, federal departments and agencies may elect to defer these improvements until the post-quantum migration. Post-quantum algorithms will be specified in a future revision of this document once foundational standards supporting their use have been adopted.

Table 1 establishes specific requirements for cryptographic algorithms and key sizes for each key type.

Table 1:Algorithm and key size requirements for PIV key types

PIV Key TypeAlgorithms and Key Sizes Through 2030Algorithm and Key Sizes for 2031 and Beyond
PIV Authentication keyRSA (2048 or 3072 bits)RSA 3072 bits
ECDSA (Curve P-256 or P-384)ECDSA (Curve P-256 or P-384)
Asymmetric Card Authentication keyRSA (2048 or 3072 bits)RSA 3072 bits
ECDSA (Curve P-256 or P-384)ECDSA (Curve P-256 or P-384)
Symmetric Card Authentication key (deprecated)3TDEA (deprecated)
AES-128, AES-192, or AES-256AES-128, AES-192, or AES-256
Digital signature keyRSA (2048 or 3072 bits)RSA 3072 bits
ECDSA (Curve P-256 or P-384)ECDSA (Curve P-256 or P-384)
Key management keyRSA key transport (2048 or 3072 bits)RSA key transport 3072
ECDH (Curve P-256 or P-384)ECDH (Curve P-256 or P-384)
PIV Secure Messaging keyECDH (Curve P-256 or P-384)ECDH (Curve P-256 or P-384)

In addition to the key sizes, keys must be generated using secure parameters. Rivest-Shamir-Adleman (RSA) keys must be generated using a public exponent of 65537. Elliptic curve keys must correspond to one of the following recommended curves from 4:

Elliptic curve keys are a faster option than RSA-based keys for the Card Authentication key for physical access since elliptic curve private key computation time is significantly shorter than RSA-based private key computation time. There is no phaseout date specified for either curve.

If the PIV Card Application supports the virtual contact interface 3 and the digital signature key, the key management key, or any of the retired key management keys are elliptic curve keys that correspond to Curve P-384, then the PIV Secure Messaging key shall use P-384. Otherwise, it may use P-256 or P-384.

While this specification requires that the RSA public exponent associated with PIV keys be 65537, applications should be able to process RSA public keys that have any public exponent that is an odd positive integer greater than or equal to 65537 and less than 2256.

This specification requires the key management key to be an RSA key transport key or an Elliptic Curve Diffie-Hellman (ECDH) key. The specifications for RSA key transport are 5 and 6, and the specification for ECDH key agreement is 7.

3.2Authentication Information Stored on the PIV Card

3.2.1Specification of Digital Signatures on Authentication Information

FIPS 201-3 requires the use of digital signatures to protect the integrity and authenticity of information stored on the PIV Card. FIPS 201-3 and SP 800-73 require digital signatures on the following objects stored on the PIV Card:

Approved digital signature algorithms are specified in 4. Table 2 provides specific requirements for public key algorithms as well as key sizes, hash algorithms, and padding schemes for generating digital signatures for digitally signed information stored on the PIV Card. Agencies are cautioned that generating digital signatures with elliptic curve algorithms may initially limit interoperability.

Table 2:Signature algorithm and key size requirements for PIV information

TimeframePublic Key Algorithms and Key SizesHash AlgorithmsPadding Scheme
Through 2030RSA (2048, 3072 or 4096)SHA-256 or SHA-384PKCS #1 v1.5
RSA (2048, 3072 or 4096)SHA-256 or SHA-384PSS
ECDSA (Curve P-256)SHA-256N/A
ECDSA (Curve P-384)SHA-384N/A
2031 and BeyondRSA (3072 or 4096)SHA-256 or SHA-384PKCS #1 v1.5
RSA (3072 or 4096)SHA-256 or SHA-384PSS
ECDSA (Curve P-256)SHA-256N/A
ECDSA (Curve P-384)SHA-384N/A

RSA signatures may use either the PKCS #1 v1.5 padding scheme or the Probabilistic Signature Scheme (PSS) padding, as specified in 4 through reference to 5. The PSS padding scheme object identifier (OID) is independent of the hash algorithm. The hash algorithm is specified as a parameter 5.

The secure messaging CVC shall be signed using ECDSA (Curve P-256) with SHA-256 if it contains an ECDH (Curve P-256) subject public key and shall be signed using ECDSA (Curve P-384) with SHA-384 otherwise. The Intermediate CVC shall be signed using RSA with SHA-256 and PKCS #1 v1.5 padding.

FIPS 201-3, SP 800-73, and SP 800-76 specify formats for the CHUID, the Security Object, the biometric information, and X.509 public key certificates, which rely on OIDs to specify which signature algorithm was used to generate the digital signature. The object identifiers specified in Table 3 must be used in FIPS 201-3 implementations to identify the signature algorithm. [3] [4]

Table 3:FIPS 201-3 signature algorithm object identifiers

Signature AlgorithmObject Identifier (OID)
RSA with SHA-1 and PKCS #1 v1.5 paddingsha1WithRSAEncryption ::= {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 5}
RSA with SHA-256 and PKCS #1 v1.5 paddingsha256WithRSAEncryption ::= {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 11}
RSA with SHA-256 and PSS paddingid-RSASSA-PSS ::= {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 10}
RSA with SHA-384 and PKCS #1 v1.5 paddingsha384WithRSAEncryption ::= {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 12}
RSA with SHA-384 and PSS paddingid-RSASSA-PSS ::= {iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 10}
ECDSA with SHA-256ecdsa-with-SHA256 ::= {iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 2}
ECDSA with SHA-384ecdsa-with-SHA384 ::= {iso(1) member-body(2) us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 3}

3.2.2Specification of Public Keys in X.509 Certificates

FIPS 201-3 requires the generation and storage of an X.509 certificate to correspond with each asymmetric private key contained on the PIV Card, except for the PIV Secure Messaging key. X.509 certificates include object identifiers to specify the cryptographic algorithm associated with a public key. Table 4 specifies the object identifiers that may be used in certificates to indicate the algorithm for a subject public key.

Table 4:Public key object identifiers for PIV key types

PIV Key TypeAsymmetric AlgorithmObject Identifier (OID)
PIV Authentication key, Card Authentication key, digital signature keyRSA{iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 1}
ECDSA{iso(1) member-body(2) us(840) ansi-X9-62(10045) id-publicKeyType(2) 1}
Key management keyRSA{iso(1) member-body(2) us(840) rsadsi(113549) pkcs(1) pkcs-1(1) 1}
ECDH{iso(1) member-body(2) us(840) ansi-X9-62(10045) id-publicKeyType(2) 1}

A single object identifier is specified in TTable 4 for all elliptic curve keys. An additional object identifier must be supplied in a parameters field to indicate the elliptic curve associated with the key.[5]

Table 5 identifies the named curves and associated OIDs.

Table 5:ECC parameter object identifiers for approved curves

Asymmetric AlgorithmObject Identifier (OID)
Curve P-256ansip256r1 ::= {iso(1) member-body(2) us(840) ansi-X9-62(10045) curves(3) prime(1) 7}
Curve P-384ansip384r1 ::= {iso(1) identified-organization(3) certicom(132) curve(0) 34}

3.2.3Specification of Message Digests in the SP 800-73-4 Security Object

SP 800-73 mandates the inclusion of a Security Object consistent with the Authenticity/Integrity Code defined by the International Civil Aviation Organization (ICAO) in [MRTD]. This object contains message digests of other digital information stored on the PIV Card and is digitally signed. This specification requires that the message digests of digital information be computed using the same hash algorithm used to generate the digital signature on the Security Object. The set of acceptable algorithms is specified in Table 2. The Security Object format identifies the hash algorithm used when computing the message digests by including an object identifier. The appropriate object identifiers are identified in Table 6.

Table 6:Hash algorithm object identifiers

Hash AlgorithmObject Identifier (OID)
SHA-256id-sha256 ::= {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 1}
SHA-384id-sha384 ::= {joint-iso-itu-t(2) country(16) us(840) organization(1) gov(101) csor(3) nistalgorithm(4) hashalgs(2) 2}

4Certificate Status Information

The FIPS 201-3 functional component PIV Card Issuance and Management Subsystem generates and distributes status information for PIV asymmetric keys other than PIV Secure Messaging keys. FIPS 201-2 mandates two formats for certificate status information:

  1. X.509 CRLs and

  2. OCSP status response messages.

The CRLs and OCSP status responses shall be digitally signed to support authentication and integrity using a key size and hash algorithm that satisfy the requirements for signing PIV information, as specified in Table 2, and that are at least as large as the key size and hash algorithm used to sign the certificate.

CRLs and OCSP messages rely on object identifiers to specify which signature algorithm was used to generate the digital signature. The object identifiers specified in Table 3 must be used in CRLs and OCSP messages to identify the signature algorithm.

5PIV Card Application Administration Keys

PIV Cards may support card activation by the card management system to support card personalization and post-issuance card updates. PIV Cards that support card personalization and post-issuance updates perform a challenge-response protocol using a symmetric cryptographic key (i.e., the PIV Card Application Administration Key) to authenticate the card management system. After successful authentication, the card management system can modify information stored on the PIV Card. Table 7 establishes specific requirements for cryptographic algorithms and key sizes for PIV Card Application Administration Keys.

Table 7:Algorithm and key size requirements for PIV Card Application Administration Keys

Card Expiration DateAlgorithm
Through December 31, 20303TDEA (deprecated)
AES-128, AES-192, or AES-256
After December 31, 2030AES-128, AES-192, or AES-256

6Identifiers for PIV Card Interfaces

SP 800-73 defines an application programming interface, the PIV Client Application Programming Interface (Part 3), and a set of mandatory card commands, the PIV Card Application Card Command Interface (Part 2). The command syntaxes for these interfaces identify PIV keys using one-byte key references, and their associated algorithms (or suites of algorithms) are specified using one-byte algorithm identifiers. The same identifiers are used in both interfaces.

Section 6.1 specifies the key reference values for each of the PIV key types. Section 6.2 defines algorithm identifiers for each cryptographic algorithm supported by this specification. Section 6.3 identifies valid combinations of key reference values and algorithm identifiers.

6.1Key Reference Values

A PIV Card key reference is a one-byte identifier that specifies a cryptographic key according to its PIV Key Type. Table 8 defines the key reference values used on the PIV interfaces for PIV Key Types.

Table 8:Key references for PIV Key Types

PIV Key TypeKey Reference Value
PIV Secure Messaging key‘04’
Retired key management key‘82’, ‘83’, ‘84’, ‘85’, ‘86’, ‘87’, ‘88’, ‘89’, ‘8A’, ‘8B’, ‘8C’, ‘8D’, ‘8E’, ‘8F’, ‘90’, ‘91’, ‘92’, ‘93’, ‘94’, ‘95’
PIV Authentication key‘9A’
PIV Card Application Administration Key‘9B’
Digital signature key‘9C’
Key management key‘9D’
Card Authentication key‘9E’

6.2PIV Card Algorithm Identifiers

A PIV Card algorithm identifier is a one-byte identifier that specifies a cryptographic algorithm and key size or a suite of algorithms and key sizes. For symmetric cryptographic operations, the algorithm identifier also specifies a mode of operation (i.e., ECB). Table 9 lists the algorithm identifiers for the cryptographic algorithms that may be recognized on the PIV interfaces. All other algorithm identifier values are reserved for future use.

Note that 3 Key Triple DESECB with identifier ‘00’ and ‘03’ is deprecated and will be removed in the next revision of this document.

Algorithm identifiers ‘27’ and ‘2E’ represent suites of algorithms and key sizes for use with secure messaging and key establishment. Cipher Suite 2 (CS2) is used to establish session keys and for secure messaging when the PIV Secure Messaging key is an ECDH (Curve P-256) key. Cipher Suite 7 (CS7) is used to establish session keys and for secure messaging when the PIV Secure Messaging key is an ECDH (Curve P-384) key. Details of secure messaging, the key establishment protocol, and the algorithms and key sizes for these two cipher suites are specified in SP 800-73-4, Part 2 3.

6.3Algorithm Identifiers for PIV Key Types

Table 9 summarizes the set of algorithms supported for each key reference value.

All cryptographic algorithms employed shall provide at least 112 bits of security strength. Cryptographic keys that will remain in use after 2030 should provide 128 bits of security strength.[6] Federal departments and agencies should consider potential cryptographic key length migrations as part of their moderate to long-term cryptographic transition and modernization plans, including the need to plan and invest for a future migration to post-quantum algorithms. Capital investments for PIV issuance and relying party systems should be selected with an emphasis on ensuring a timely migration to post-quantum algorithms once standards, technologies, and services are available. If a migration to longer cryptographic keys would require significant resources or infrastructure upgrades, federal departments and agencies may elect to defer these improvements until the post-quantum migration. Post-quantum algorithms will be specified in a future revision of this document once foundational standards supporting their use have been adopted.

Table 9:PIV Card keys: Key references and algorithms

PIV Key Type

Key Reference Value

Algorithm Identifiers Through 2030

Algorithm Identifiers After 2030

PIV Secure Messaging key

‘04’

‘27’, ‘2E’

‘27’, ‘2E’

Retired key management key

‘82’, ‘83’, ‘84’, ‘85’, ‘86’, ‘87’, ‘88’, ‘89’, ‘8A’, ‘8B’, ‘8C’, ‘8D’, ‘8E’, ‘8F’, ‘90’, ‘91’, ‘92’, ‘93’, ‘94’, ‘95’

‘05’, ‘06’, ‘07’, ‘11’, ‘14’

‘05’, ‘06’, ‘07’, ‘11’, ‘14’

PIV Authentication key

‘9A’

‘05’, ‘07’, ‘11’, ‘14’

‘05’, ‘11’, ‘14’

PIV Card Application Administration Key

‘9B’

‘00’, ‘03’, ‘08’, ‘0A’, ‘0C’

‘08’, ‘0A’, ‘0C’

Digital signature key

‘9C’

‘05’, ‘07’, ‘11’, ‘14’

‘05’, ‘11’, ‘14’

Key management key

‘9D’

‘05’, ‘07’, ‘11’, ‘14’

‘05’, ‘11’, ‘14’

Asymmetric Card Authentication key

‘9E’

‘05’, ‘07’, ‘11’, ‘14’

‘05’, ‘11’, ‘14’

Symmetric Card Authentication key (deprecated)

‘9E’

‘00’, ‘03’, ‘08’, ‘0A’, ‘0C’

‘08’, ‘0A’, ‘0C’

7Cryptographic Algorithm Validation Testing Requirements

As noted in Section 4.2.2 of 2, the PIV Card shall be validated under 8 with an overall validation of Level 2 and with Level 3 physical security. The scope of the Cryptographic Module Validation Program (CMVP) validation shall include all cryptographic operations performed over both contact and contactless interfaces. This section [7] describes the Cryptographic Algorithm Validation Program (CAVP) tests that are required for each supported key and algorithm at the time of publication.[8] If any changes are made to the CAVP validation requirements, the changes and the deadlines for conformance with these requirements will be posted on NIST’s Personal Identity Verification Program (NPIVP) web page at https://csrc.nist.gov/projects/nist-personal-identity-verification-program.

7.1PIV Authentication Key

7.2Asymetric Card Authentication Key

7.3Symmetric Card Authentication Key

7.4Digital Signature Key

7.5Key Management Key

7.6PIV Card Application Administration Key

7.7PIV Secure Messaging Key

References

  1. Ferraiolo, H., & Regenscheid, A. (2024). Cryptographic Algorithms and Key Sizes for Personal Identity Verification (Techreport NIST SP 800-78-5). National Institute of Standards. 10.6028/NIST.SP.800-78-5
  2. National Institute of Standards and Technology. (2022). Personal Identity Verification (PIV) of Federal Employees and Contractors (Federal Information Processing Standards Publication FIPS 201-3). U.S. Department of Commerce. 10.6028/NIST.FIPS.201-3
  3. National Institute of Standards and Technology. (2024). Interfaces for Personal Identity Verification (NIST Special Publication SP 800-73-5). National Institute of Standards. 10.6028/NIST.SP.800-73pt1-5
  4. National Institute of Standards and Technology. (2023). Digital Signature Standard (DSS) (Federal Information Processing Standards Publication FIPS 186-5). U.S. Department of Commerce. 10.6028/NIST.FIPS.186-5
  5. Moriarty, K., Kaliski, B., Jonsson, J., & Rusch, A. (2016). PKCS #1: RSA Cryptography Specifications Version 2.2. RFC 8017. https://www.rfc-editor.org/rfc/rfc8017.txt
  6. National Institute of Standards and Technology. (2019). Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography (NIST Special Publication SP 800-56B Rev. 2). National Institute of Standards. 10.6028/NIST.SP.800-56Br2
  7. National Institute of Standards and Technology. (2018). Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (NIST Special Publication SP 800-56A Rev. 3). National Institute of Standards. 10.6028/NIST.SP.800-56Ar3
  8. National Institute of Standards and Technology. (2019). Security Requirements for Cryptographic Modules (Federal Information Processing Standards Publication FIPS 140-3). U.S. Department of Commerce. 10.6028/NIST.FIPS.140-3
  9. National Institute of Standards and Technology. (2020). Recommendation for Key Management – Part 1: General (NIST Special Publication SP 800-57 Part 1 Rev. 5). National Institute of Standards. 10.6028/NIST.SP.800-57pt1r5

AList of Symbols, Abbreviations, and Acronyms

3TDEA
Three key TDEA (TDEA with Keying Option 1)
AES
Advanced Encryption Standard
CA
Certification Authority
CAVP
Cryptographic Algorithm Validation Program
CBC
Cipher Block Chaining
CBEFF
Common Biometric Exchange Formats Framework
CDH
Cofactor Diffie-Hellman
CHUID
Card Holder Unique Identifier
CMAC
Cipher-Based Message Authentication Code
CMVP
Cryptographic Module Validation Program
CRL
Certificate Revocation List
CVC
Card Verifiable Certificate
DES
Data Encryption Standard
DRBG
Deterministic Random Bit Generator
ECB
Electronic Codebook
ECC
Elliptic Curve Cryptography
ECDH
Elliptic Curve Diffie-Hellman
ECDSA
Elliptic Curve Digital Signature Algorithm
ICAO
International Civil Aviation Organization
OCSP
Online Certificate Status Protocol
OID
Object Identifier
PIV
Personal Identity Verification
PKCS
Public-Key Cryptography Standards
PKI
Public Key Infrastructure
PSS
Probabilistic Signature Scheme
RSA
Rivest-Shamir-Adleman Cryptographic Algorithm
SHA
Secure Hash Algorithm
SHS
Secure Hash Standard
TDEA
Triple Data Encryption Algorithm; Triple DEA

BChange Log

This appendix is informative and provides an overview of the changes made to SP 800-78 since its initial release.

In August 2007, Revision 1 enhanced alignment with the National Security Agency’s Suite B Cryptography by:

In February 2010, Revision 2 updates included:

In December 2010, Revision 3 updates included:

In 2014, Revision 4 updates included:

In 2024, Revision 5 updates incorporated the following changes:

Footnotes
  1. The digital signature and key management keys are mandatory if the cardholder has a government-issued email account at the time of credential issuance.

  2. For detailed guidance on the strength of cryptographic algorithms, see NIST SP 800-57, Recommendation on Key Management – Part 1: General 9.

  3. The OID for RSA with SHA-1 and PKCS #1 v1.5 padding is included in Table 3 since applications may encounter X.509 certificates that were signed before January 1, 2011, using this algorithm.

  4. For the CHUID, Security Object, and biometric information, the signatureAlgorithm field of SignerInfo shall contain rsaEncryption (1.2.840.113549.1.1.1) when the signature algorithm is RSA with PKCS #1 v1.5 padding.

  5. RSA exponents are encoded with the modulus in the certificate’s subject public key, so the OID is not affected.

  6. For detailed guidance on the strength of cryptographic algorithms, see NIST SP 800-57, Recommendation on Key Management – Part 1: General 9.

  7. Terms used in this section are from the corresponding algorithm validation list available https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/validation-search

  8. TDEA has been removed from this section since [SP 800-131A Revision 2] has deprecated its use through 2023 and disallowed its use after 2023. Consequently, on January 1, 2024, CMVP will move validated TDEA implementations to the FIPS 140-mode non-approved historical validation list.