AACAs used by HACE are implemented in an ASD approved configuration, with preference given to CNSA Suite algorithms and key sizes.
Topic
Cryptographic algorithms for use with High Assurance Cryptographic Equipment
Applicable to
Secret, Top Secret
History
Priority
must
Mar 2022
Removed
The existing table outlining cryptographic algorithms for use with High Assurance Cryptographic Equipment has been converted into discrete recommendations. Furthermore, the recommendation to give preference to the United State’s Commercial National Security Algorithm suite algorithms and key sizes (ISM-1232) has been rescinded in preference to including recommended key lengths for each individual algorithm.
Dec 2021
AACAs used by HACE are implemented in an ASD approved configuration, with preference given to CNSA Suite algorithms and key sizes.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
May 2019
AACAs are used in an evaluated implementation.
Security control 1232 was modified to remove references to Suite B and CNSA Suite algorithms.
Apr 2019
Suite B or CNSA Suite algorithms are used in an evaluated configuration.
Security control 1232 was modified to reflect the correct terminology of ‘CNSA Suite algorithms’.
Mar 2019
Suite B and CNSSAM 02-15 algorithms are used in an evaluated configuration.
2015
Agencies using Suite B algorithms must use them in an evaluated configuration.