Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Projects

Showing 1 through 10 of 23 matching records.
Automated Cryptographic Validation Testing ACVT
The Cryptographic Algorithm Validation Program (CAVP) and the Cryptographic Module Validation Program (CMVP) were established on July 17, 1995 by NIST to validate cryptographic modules conforming to the Federal Information Processing Standards (FIPS) 140-1, Security Requirements for Cryptographic Modules, and other FIPS cryptography based standards. FIPS 140-2 was released on May 25, 2001 and supersedes FIPS 140-1.The current implementation of the CMVP is shown in Figure 1 below. The CAVP is...
Block Cipher Techniques
Approved AlgorithmsCurrently, there are two (2) Approved* block cipher algorithms that can be used for both applying cryptographic protection (e.g., encryption) and removing or verifying the protection that was previously applied (e.g., decryption): AES and Triple DES. Two (2) other block cipher algorithms were previously approved: DES and Skipjack; however, their approval has been withdrawn. See the discussions below for further information; also see SP 800-131A Rev. 1, Transitions...
Circuit Complexity
Boolean functions for a wide class of applications (such as encryption, digital signatures, hashing, and error correction codes) can be implemented as electronic circuits. In practice, it is important to be able to minimize the size and depth of these circuits. The Circuit Complexity Project aims at finding combinational circuits—over the basis AND, XOR, NOT—for boolean functions.The problem, even for functions on very few inputs, is computationally intractable. This means that optimal...
Computer Security Objects Register CSOR
Information objects that convey information used to maintain the security of resources in computerized environments are known as Computer Security Objects (CSOs). The Computer Security Objects Register (CSOR) specifies names that uniquely identify CSOs. These unique names are used to reference these objects in abstract specifications and during the negotiation of security services for a transaction or application. The CSOR is also a repository of parameters associated with the registered...
Crypto Reading Club
The Computer Security Division hosts Crypto Reading Club talks to foster research and collaboration in cryptography.When:Wednesday (bi-weekly), 10:00am-12:00pm (Eastern Time), unless noted otherwise.Where:NIST Building 222, Room B341 Gaithersburg, MD 20899NIST Visitor InformationEmail List:Meeting reminders will be sent to subscribers of the Crypto Reading Club List.To be added to the list and/or give a talk, please contact Morris J. Dworkin or Meltem Sonmez Turan. Upcoming Talks...
Cryptographic Algorithm Validation Program CAVP
The Cryptographic Algorithm Validation Program (CAVP) provides validation testing of FIPS-approved and NIST-recommended cryptographic algorithms and their individual components. Cryptographic algorithm validation is a prerequisite of cryptographic module validation.Vendors may use any of the NVLAP-accredited Cryptographic and Security Testing (CST) Laboratories to test algorithm implementations.An algorithm implementation successfully tested by a lab and validated by NIST is added to an...
Cryptographic Module Validation Program CMVP
What Is The Purpose Of The CMVP?On July 17, 1995, NIST established the Cryptographic Module Validation Program (CMVP) that validates cryptographic modules to Federal Information Processing Standards (FIPS)140-1, Security Requirements for Cryptographic Modules, and other FIPS cryptography based standards. FIPS 140-2, Security Requirements for Cryptographic Modules, was released on May 25, 2001 and supersedes FIPS 140-1. The CMVP is a joint effort between NIST and the Communications...
Cryptographic Research
NIST continues to develop cryptographic expertise in several research areas:Circuit ComplexityElliptic Curve CryptographyLightweight CryptographyPairing-Based CryptographyPost-Quantum Cryptography (PQC)Privacy-Enhancing CryptographyWe also host a Crypto Reading Club that meets biweekly to foster research and collaboration in cryptography.
Cryptographic Standards and Guidelines Development Process
In 2013, news reports about leaked classified documents caused concern from the cryptographic community about the security of NIST cryptographic standards and guidelines. NIST is also deeply concerned by these reports, some of which have questioned the integrity of the NIST standards development process.NIST has a proud history in open cryptographic standards, beginning in the 1970s with the Data Encryption Standard. We strive for a consistently open and transparent process that enlists the...
Digital Signatures
As an electronic analogue of a written signature, a digital signature provides assurance that:the claimed signatory signed the information, andthe information was not modified after signature generation.Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard (DSS), specifies three NIST-approved digital signature algorithms: DSA, RSA, and ECDSA. All three are used to generate and verify digital signatures, in conjunction with an approved hash function specified in FIPS...

1     2     3  next >  last >>