NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

Cryptographic Applications & Infrastructures

Application developers depend upon security protocols to establish security services (e.g., to establish a secure tunnel) using cryptography.  In turn, these protocols rely on cryptographic infrastructures, such as Kerberos or Public Key Infrastructure (PKI), to manage and distribute cryptographic keys. The Security Technology Group develops and enhances standards, test methods, and guidelines for these critical building blocks in collaboration with international standards organizations, product developers, and Federal agencies.   The Security Technology Group also is a key player in the U.S. Federal Government’s PKI deployment activities.