This bulletin summarizes guidance and information that was published by NIST to help organizations select and implement transport level security, making effective use of Federal Information Processing Standards (FIPS) approved cryptographic algorithms and open source technology. The guide, NIST SP 800-32, Guidance for the Selection and Use of Transport Layer Security (TSL) Implementations was written by C. Michael Chernick (NIST), Charles Edington III (Booz Allen Hamilton), Matthew J. Fanto (NIST), and Rob Rosenthal (Booz Allen Hamilton). SP 800-52 advises organizations how to use authentication, confidentiality and integrity mechanisms to protect information at the transport layer.
This bulletin summarizes guidance and information that was published by NIST to help organizations select and implement transport level security, making effective use of Federal Information Processing Standards (FIPS) approved cryptographic algorithms and open source technology. The guide, NIST SP...
See full abstract
This bulletin summarizes guidance and information that was published by NIST to help organizations select and implement transport level security, making effective use of Federal Information Processing Standards (FIPS) approved cryptographic algorithms and open source technology. The guide, NIST SP 800-32, Guidance for the Selection and Use of Transport Layer Security (TSL) Implementations was written by C. Michael Chernick (NIST), Charles Edington III (Booz Allen Hamilton), Matthew J. Fanto (NIST), and Rob Rosenthal (Booz Allen Hamilton). SP 800-52 advises organizations how to use authentication, confidentiality and integrity mechanisms to protect information at the transport layer.
Hide full abstract
Keywords
cryptography; network security; TLS; transport layer security