NIST is pleased to announce the release of Special Publication 800-82, Revision 2, Guide to Industrial Control Systems (ICS) Security. Link to the full news announcement about this Special Publication (SP 800-82 Revision 2) can be found on the CSRC News page at: http://csrc.nist.gov/news_events/#june8b Direct link to the SP 800-82 Revision 2 document (in .PDF) on the NIST Library website: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf NIST’s Public Affairs Office also released a press release regarding the release of this Special Publication: http://www.nist.gov/el/isd/201506_ics_security.cfm Link to this Special Publication is also provided on the CSRC Special Publications page at: http://csrc.nist.gov/publications/PubsSPs.html#800-82
Source: Heise The competition run by the US National Institute of Standards and Technology (NIST) to find the next generation of cryptographic hash functions has gone into its second round. Fourteen algorithms are still vying to be crowned in 2012 as the next standard for cryptographic hash functions, SHA-3 (Secure Hash Algorithm). I am curious who will win.