Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Cryptographic Technology CT

Mission Statement

We research, develop, engineer, and produce guidelines, recommendations and best practices for cryptographic algorithms, methods, and protocols.

Overview

The Cryptographic Technology (CT) Group’s work in cryptographic mechanisms addresses topics such as hash algorithms, symmetric and asymmetric cryptographic techniques, key management, authentication, and random number generation. Strong cryptography is used to improve the security of information systems and the information they process. Users then take advantage of the availability of secure applications in the marketplace made possible by the appropriate use of standardized, high quality cryptography.

Staff Listing and Profiles

Program Areas

Cryptographic Standards and Guidelines

  • Cryptographic standards and guidelines (by project area)
  • Implementation-related references (test vectors & object identifiers)
  • Guideline for using cryptography in the Federal Government
  • Cryptographic standards development process

Cryptographic Research

  • Circuit complexity
  • Elliptic curve cryptography
  • Lightweight cryptography
  • Pairing-based cryptography
  • Post-quantum cryptography
  • Privacy-enhancing cryptography​

Created May 24, 2016, Updated February 22, 2018