Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Projects

Showing 3 matching records.
Block Cipher Techniques
Approved Algorithms Currently, there are two (2) Approved* block cipher algorithms that can be used for both applying cryptographic protection (e.g., encryption) and removing or verifying the protection that was previously applied (e.g., decryption): AES and Triple DES. Two (2) other block cipher algorithms were previously approved: DES and Skipjack; however, their approval has been withdrawn. See the discussions below for further information; also see SP 800-131A Rev. 2, Transitioning the Use...
Message Authentication Codes MAC
The message authentication code (MAC) is generated from an associated message as a method for assuring the integrity of the message and the authenticity of the source of the message.  A secret key to the generation algorithm must be established between the originator of the message and its intended receiver(s). Approved Algorithms Currently, there are three approved* general-purpose MAC algorithms:  HMAC, KMAC, and CMAC. Keyed-Hash Message Authentication Code (HMAC) The initial...
Multi-Party Threshold Cryptography MPTC
The multi-party paradigm of threshold cryptography enables threshold schemes, for a secure distribution of trust in the operation of cryptographic primitives. Threshold Call: Second public draft (NIST IR 8214C 2pd) published on 2025-Mar-27. Compilation of comments (and responses) published on 2025-June-30. The final version of the Threshold Call is being produced and will be published when possible A LaTeX template for Preview Writeups (.zip and .pdf) is available (v0.1.6, updated...