Pointless PR exercise..
..contrived to restore misplaced warm-and-fuzzyness in the NSA's crapto dissemination front.
1) Drop your NSA-only primitives ruse and permit require!! multiple heterogeneous redundancy.
2) Redesign all your crapto protocols to transfer primitive selection/assembly authority from server (where you've been told all along IT DOESN'T BELONG) to client.
AES/Twofish/Camellia/Aria/Serpent, CBC/ECB/CTR/OCB/GCM/CFB/Salsa20+Poly1305, Whirlpool/Blake2/Skein/Grøstl/JH/Skein/Keccak... oh the permutations! You'd HATE that, wouldn't you? ...and those strange souls who don't completely trust NSA with their privacy & security could remove YOUR AES/SHA completely! You'd REALLY HATE that, wouldn't you? While those who must can disable the rest to conform to YOUR "certification" ...and when the next NSA primitive to be unpicked explodes in our faces, the client vendors could merely issue an immediate routine patch to remove it from use and protect all those who hadn't thought to disable your primitives for themselves. Without "having" to wait for YOU to recontrive & "ratify" a replacement OR ANYTHING!!!one Awesome!?! Have you bust an aneurysm yet "NIST"?
3) Redesign all your crapto protocols to transfer random number generation from often heavily loaded and entropy starved server (where you've been told all along IT DOESN'T BELONG - SDOOPID FUCKTARDS) to client typically awash with entropy... unless you're expecting us to be surfing the web with smartcards. Hint: You're not.
What's that? "la la la we still can't hear reason... anyway we're not asking for help with our b0rken-by-design protocols, stupid, we're asking for window dressing"
Same old TLA. Same old shit.