Statements (20)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:NIST_Special_Publication
|
| gptkbp:appliesTo |
federal agencies
cryptographic module implementers |
| gptkbp:firstPublished |
2011
|
| gptkbp:focusesOn |
cryptographic algorithm transitions
key length recommendations |
| gptkbp:fullTitle |
gptkb:Transitions:_Recommendation_for_Transitioning_the_Use_of_Cryptographic_Algorithms_and_Key_Lengths
|
| gptkbp:publishedBy |
gptkb:National_Institute_of_Standards_and_Technology
|
| gptkbp:publishedIn |
gptkb:800-131A
|
| gptkbp:recommendation |
minimum key lengths for symmetric and asymmetric algorithms
disallowing use of SHA-1 for digital signature generation |
| gptkbp:replacedBy |
previous NIST cryptographic guidance
|
| gptkbp:series |
gptkb:NIST_Special_Publication_800_Series
|
| gptkbp:status |
active
|
| gptkbp:updated |
2015
Rev. 2 |
| gptkbp:url |
https://csrc.nist.gov/publications/detail/sp/800-131a/rev-2/final
|
| gptkbp:bfsParent |
gptkb:NIST
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
SP 800-131A
|