« Currently, Suite B cryptographic algorithms are specified by the National Institute of Standards and Technology (NIST) and are used by NSA's Information Assurance Directorate in solutions approved for protecting classified and unclassified National Security Systems (NSS). Below, we announce preliminary plans for transitioning to quantum resistant algorithms.
[...]
Until this new suite is developed and products are available implementing the quantum resistant suite, we will rely on current algorithms. For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum resistant algorithm transition.
[...]
During the current transition phase, the following public algorithms should be used to protect IA and IA-enabled IT products with integrated cryptography acquired by U.S. Government Departments and Agencies to protect NSS and the information that resides therein:
Advanced Encryption Standard (AES) - Symmetric block cipher used for information protection - Use 256 bit keys to protect up to TOP SECRET
Elliptic Curve Diffie-Hellman (ECDH) Key Exchange - Asymmetric algorithm used for key establishment - Use Curve P-384 to protect up to TOP SECRET.
Elliptic Curve Digital Signature Algorithm (ECDSA) - Asymmetric algorithm used for digital signatures - Use Curve P-384 to protect up to TOP SECRET.
Secure Hash Algorithm (SHA) - Algorithm used for computing a condensed representation of information - Use SHA-384 to protect up to TOP SECRET.
Diffie-Hellman (DH) Key Exchange - Asymmetric algorithm used for key establishment - Minimum 3072-bit modulus to protect up to TOP SECRET
RSA - Asymmetric algorithm used for key establishment - Minimum 3072-bit modulus to protect up to TOP SECRET
RSA - Asymmetric algorithm used for digital signatures - Minimum 3072 bit-modulus to protect up to TOP SECRET. »
Tiens, la NSA a-t-elle connaissance de failles ou d’état de l’art sur ces algorithmes dont nous n’aurions pas connaissance ? :))))
Via
https://twitter.com/aeris22/status/653900598891429888