{"id":28758,"date":"2015-01-24T11:41:04","date_gmt":"2015-01-24T16:41:04","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/nist-pledges-transparency-in-nsa-dealings-over-crypto-standards.php"},"modified":"2015-01-24T11:41:04","modified_gmt":"2015-01-24T16:41:04","slug":"nist-pledges-transparency-in-nsa-dealings-over-crypto-standards","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/nist-pledges-transparency-in-nsa-dealings-over-crypto-standards.php","title":{"rendered":"NIST pledges transparency in NSA dealings over crypto standards"},"content":{"rendered":"<p><p>  The agency says it will disclose all contributions from the  National Security Agency<\/p>\n<p>    A U.S. agency that develops widely used standards for    encryption has pledged to be more transparent about its    dealings with the National Security Agency, amid concerns the    NSA undermined those standards to boost its surveillance    efforts.  <\/p>\n<p>    The National Institute of Standards and Technology outlined new    proposed operating procedures in an     updated draft published Friday. It's seeking public    comments on the proposal through March 27.  <\/p>\n<p>    The document follows     a report last July from independent security experts who    concluded NIST had put     too much faith in the NSA in developing cryptographic    standards.  <\/p>\n<p>    \"The new draft expands on NIST's interactions with the National    Security Agency (NSA), explaining how the agencies work    together and what steps are now in place to ensure NSA's    contributions to the standards development process are    transparent,\" NIST    said.  <\/p>\n<p>    \"The new processes will ensure that NIST attributes to the NSA    all algorithms, standards or guidelines contributed by the    agency's staff, and acknowledges all comments received from the    NSA.\"  <\/p>\n<p>    NIST has been in the spotlight since 2013, when     reports based on leaked documents from Edward Snowden    claimed the NSA used its influence over NIST to insert a    backdoor in at least one cryptographic standard and possibly to    weaken others.  <\/p>\n<p>    Last February, NIST appointed an independent panel of    technologists review its practices, including Ed Felten, a    computer scientist at Princeton University, Ron Rivest, an MIT    professor, and Internet pioneer Vint Cerf, who works at Google.  <\/p>\n<p>    They concluded that NIST needed to hire more cryptographic    experts and reduce its reliance on the NSA for decisions about    standards.  <\/p>\n<p>    Friday's proposal reflects the feedback in that report and from    public comments on     the first draft, which was published last February and said    much less about NIST's work with the NSA.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the rest here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.computerworld.com.au\/article\/564693\/nist-pledges-transparency-nsa-dealings-over-crypto-standards\/?utm_medium=rss&utm_source=taxonomyfeed\/RK=0\/RS=oslt6vtper8E4Z6AJrvH7KnVRdI-\" title=\"NIST pledges transparency in NSA dealings over crypto standards\">NIST pledges transparency in NSA dealings over crypto standards<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The agency says it will disclose all contributions from the National Security Agency A U.S. agency that develops widely used standards for encryption has pledged to be more transparent about its dealings with the National Security Agency, amid concerns the NSA undermined those standards to boost its surveillance efforts. The National Institute of Standards and Technology outlined new proposed operating procedures in an updated draft published Friday<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-28758","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28758"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28758"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28758\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}