NIST Updates FIPS 197, Advanced Encryption Standard (AES)

Today, NIST has published an update of Federal Information Processing Standards Publication (FIPS) 197, Advanced Encryption Standard (AES). This update makes no technical changes to the algorithm specified in the standard, which was originally published in 2001.

However, this update includes extensive editorial improvements to the original version, including the following:

  • The front matter is modernized (e.g., a foreword and abstract are added).
  • Terms and symbols are defined more comprehensively and consistently.
  • Formatting/typesetting is improved in a variety of ways.
  • Unnecessary formalism is removed.
  • Diagrams for the three key schedules are included.
  • Some references were updated, and additional references are provided.

The changes are documented in greater detail in Appendix D of the updated FIPS. NIST originally proposed to update FIPS 197 in this manner on December 19, 2022.  The proposal included the release of a draft of the FIPS update for public comment, as well as a summary of the determination that no technical revisions were necessary. No public comments were received on the proposal nor the draft.

Previously, NIST had posted an initial call for comments on FIPS 197 on May 10, 2021, and received three sets of public comments. More details about this review are available from NIST’s Crypto Publication Review Project site.

Read More

NIST to Revise SP 800-132, Recommendation for Password-Based Key Derivation

In January 2023, NIST’s Crypto Publication Review Board initiated a review process for NIST Special Publication (SP) 800-132, Recommendation for Password-Based Key Derivation – Part 1: Storage Applications (December 2010). In March 2023, NIST proposed revising SP 800-132, in response to the public comments received.

NIST has decided to revise SP 800-132. See the full announcement for more details, links to comments received, and ways to monitor future developments.

Read More

New Google Cybersecurity training

Taken from Google introduces new cybersecurity career certificate (blog.google)

Our new Certificate builds on our existing Google Career Certificates in Data AnalyticsDigital Marketing & E-commerceIT SupportProject Management and UX Design. The Google Cybersecurity Certificate will teach learners how to identify common risks, threats and vulnerabilities, as well as the techniques to mitigate them. The program will prepare people for entry-level cybersecurity roles by providing hands-on experience with industry standard tools including Python, Linux and an array of security tools, including Security Information and Event Management (SIEM) programs. The certificate will also help prepare learners for the CompTIA Security+ exam, the industry-leading certification for cybersecurity roles. Learners will earn a dual credential when they complete both, improving their hireability.

To help bridge the opportunity gap and bring more diverse talent to cybersecurity, Google.org grantees like NPower and Hiring our Heroes, as well as nonprofits like Cyversity, Raices Cyber and Women in CyberSecurity (WiCyS), will offer the Google Cybersecurity Certificate. They’ll also provide learners with support such as professional coaching, interview prep and job placement assistance.

Webinar on Protecting Controlled Unclassified Information: What’s New in Draft SP 800-171, Revision 3

On June 6, 2023, from 1:00 – 2:00 PM EDT, NIST will host a webinar to provide an overview of the significant changes in NIST Special Publication (SP) 800-171, Revision 3, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. 

This revision to NIST SP 800-171 represents over one year of data collection, technical analyses, customer interaction, redesign, and development of the security requirements and supporting information for the protection of Controlled Unclassified Information (CUI). 

Please join us in an author-led discussion of the changes proposed, the drivers behind the changes, and the critical areas where more input is needed. Space is limited, so register today! The webinar will be recorded and posted online after the event.

Please direct questions and comments to [email protected].

Read More

NIST Updates FIPS 197, Advanced Encryption Standard (AES)

Today, NIST has published an update of Federal Information Processing Standards Publication (FIPS) 197, Advanced Encryption Standard (AES). This update makes no technical changes to the algorithm specified in the standard, which was originally published in 2001.

However, this update includes extensive editorial improvements to the original version, including the following:

  • The front matter is modernized (e.g., a foreword and abstract are added).
  • Terms and symbols are defined more comprehensively and consistently.
  • Formatting/typesetting is improved in a variety of ways.
  • Unnecessary formalism is removed.
  • Diagrams for the three key schedules are included.
  • Some references were updated, and additional references are provided.

The changes are documented in greater detail in Appendix D of the updated FIPS. NIST originally proposed to update FIPS 197 in this manner on December 19, 2022.  The proposal included the release of a draft of the FIPS update for public comment, as well as a summary of the determination that no technical revisions were necessary. No public comments were received on the proposal nor the draft.

Previously, NIST had posted an initial call for comments on FIPS 197 on May 10, 2021, and received three sets of public comments. More details about this review are available from NIST’s Crypto Publication Review Project site.

Read More

Access Control Based on Attribute Encryption: NIST IR 8450 Draft is Available for Public Comment

NIST Internal Report (IR) 8450, Overview and Considerations of Access Control Based on Attribute Encryption, is now available for public review and comment.

Access control based on attribute encryption addresses an issue with traditional public-key encryption (PKE) wherein keys need to dynamically change whenever access policies and/or attributes change, which could cause inefficient system performance.

Access control based on attribute encryption supports fine-grained access control for encrypted data and is a cryptographic scheme that goes beyond the all-or-nothing approach of public-key encryption. This document reviews the interplay between cryptography and the access control of attribute-based encryption, including the fundamental theories on which the scheme is based; the various main algorithms of IBE, CP-ABE, and KP-ABE; and considerations for deploying access control systems based on encryption.

The public comment period is open through June 23, 2023. See the publication details for a copy of the draft and instructions for submitting comments.


NOTE: A call for patent claims is included on page ii of this draft. For additional information, see the
Information Technology Laboratory (ITL) Patent Policy Inclusion of Patents in ITL Publications.

Read More

Guidance related to Secure Boot Manager changes associated with CVE-2023-24932

Microsoft Blog Post

, Microsoft is releasing CVE-2023-24932, and associated configuration guidance, to address a Secure Boot bypass vulnerability used by the BlackLotus bootkit to exploit CVE-2022-21894. Customers will need to closely follow the configuration guidance to fully protect against this vulnerability.

This vulnerability allows an attacker to execute self-signed code at the Unified Extensible Firmware Interface (UEFI) level while Secure Boot is enabled. This is used by threat actors primarily as a persistence and defense evasion mechanism. Successful exploitation relies on the attacker having physical access or local admin privileges on the targeted device.

To protect against this attack, a fix for the Windows boot manager (CVE-2023-24932) is included in the May 9, 2023, security update release, but disabled by default and will not provide protections. Customers will need to carefully follow manual steps to update bootable media and apply revocations before enabling this update.

We will be enforcing the protections in three phases to reduce customer and industry partner impact with existing Secure Boot while applying this change.

  • May 9, 2023: The initial fix for CVE-2023-24932 is released. In this release, this fix requires the May 9, 2023, Windows Security Update and additional customer action to fully implement the protections.
  • July 11, 2023: A second release will provide additional update options to simplify the deployment of the protections.
  • First quarter 2024: This final release will enable the fix for CVE-2023-24932 by default and enforce bootmanager revocations on all Windows devices.

If these timelines change for any reason, this blog will be updated.

Why is Microsoft taking a phased approach to address this vulnerability? 

The Secure Boot feature precisely controls the boot media that is allowed to load when an operating system is initiated, and if this fix is not properly enabled there is a potential to cause disruption and prevent a system from starting up. The technical documentation referenced below provides implementation and testing guidance to limit potential impact at this time, and future release plans will allow Microsoft to simplify deployment without disruption.

Please follow the Microsoft Windows Secure Boot Guidance to implement the fix for CVE-2023-24932.

How do customers know if they are using Secure Boot? 

From a Windows command prompt, enter msinfo32. If it shows Secure Boot State is ON, the system.

Note: The publicly known vulnerability does not present any additional risk if secure boot is not enabled, and no additional steps are required. We recommend that customers use Secure Boot to protect systems from tampering and bootkit class exploits and to keep their systems up to date with the latest Windows Updates.  For more information about the benefits of Secure Boot, see: Secure Boot and Trusted Boot.

Acknowledgement   

  • We appreciate the opportunity to investigate the findings reported by Tomer Sne-or with SentinelOne and Martin Smolár from ESET which helped us harden the service, and thank them for practicing safe security research under the terms of the Microsoft Bug Bounty Program. We encourage all researchers to work with vendors under Coordinated Vulnerability Disclosure (CVD) and abide by the rules of engagement for penetration testing to avoid impacting customer data while conducting security research.

NIST Revises SP 800-171 Guidelines for Protecting Sensitive Information

NIST Revises SP 800-171 Guidelines for Protecting Sensitive Information The National Institute of Standards and Technology (NIST) has updated its draft guidelines for protecting sensitive unclassified information, in an effort to help federal agencies and government contractors more consistently implement cybersecurity requirements. The revised draft guidelines, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations (NIST Special Publication [SP] 800-171 Revision 3), will be of particular interest to the many thousands of businesses that contract with the federal government. Federal rules that govern the protection of controlled unclassified information (CUI), which includes such sensitive data as health information, critical energy infrastructure information and intellectual property, reference the SP 800-171 security requirements. Systems that store CUI often support government programs containing critical assets, such as design specifications for weapons systems, communications systems and space systems. Read More

Draft NIST SP 800-171 Revision 3, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

The initial public draft of NIST Special Publication (SP) 800-171, Revision 3, Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations is available for public comment and review.

The updates in this draft publication have been guided and informed by the public comments received and NIST’s responsibility to meet the requirements of the Federal Information Security Modernization Act, Executive Order (EO) 13556, the CUI federal regulation, and Office of Management and Budget (OMB) Circular A-130. Many trade-offs have been made to ensure that the technical and non-technical requirements have been stated clearly and concisely while also recognizing the specific needs of both federal and nonfederal organizations.

In addition to the draft publication, NIST has issued an FAQ, a detailed analysis of the changes between Revision 2 and Revision 3, and a prototype CUI Overlay. These supporting materials are available on the publication details page.

NIST will also host a webinar on June 6, 2023, to provide an overview of the significant changes made to NIST SP 800-171, Revision 3. Registration information will be announced separately through a GovDelivery announcement and on the Protecting CUI project site.

Submit Your Comments

The public comment period is open through July 14, 2023. See the publication details for a copy of the draft and instructions for submitting comments. Reviewers are encouraged to comment on all or parts of draft NIST SP 800-171, Revision 3. Comments received in response to this request will be posted on the Protecting CUI project site after the due date. Submitters’ names and affiliations (when provided) will be included, while contact information will be removed. Please direct questions and comments to [email protected].


NOTE: A call for patent claims is included on page ii of this draft. For additional information, see the
Information Technology Laboratory (ITL) Patent Policy Inclusion of Patents in ITL Publications.

Read More

Register Now for the NCCoE Manufacturing Community of Interest (COI) Update

Throughout the past six months, the NCCoE Manufacturing team has published the NIST Final Project Description: Responding to and Recovering from a Cyber Attack as well as the NIST Cybersecurity White Paper: Security Segmentation in a Small Manufacturing Environment. Join us for an update to discuss these two publications in detail.

During this one hour webinar, the team will give an overview of their newest Cybersecurity White Paper, which outlines a six-step approach that manufacturers can follow to implement security segmentation and mitigate cyber vulnerabilities in their manufacturing environments.

In addition, the team will discuss the progress on the Respond and Recover project, including a discussion of the planned scenarios. We look forward to feedback from the COI to make sure the needs of manufacturers are covered in these projects.

Event Agenda:

  • Discussion: Security Segmentation in a Small Manufacturing Environment
  • Discussion: Responding to and Recovering from a Cyber Attack
  • Audience Q&A / Closing

If you have any questions, please reach out to the NCCoE Manufacturing team at [email protected].

Event Page