Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "


Limit results to content tagged with of the following topics:
Showing 701 through 725 of 15603 matching records.
Project Pages https://csrc.nist.gov/projects/united-states-government-configuration-baseline/modification-log

2017.01.27 - Microsoft Virtual PC Windows 7 32-bit VHD (USGCB-Windows7-VPC-x86-1.1.x.0-20110124.zip) - End of Life (EOL). This VHD is no longer supported and is unavailable. 2015.04.20 - USGCB SCAP 1.2 Content Final Release for Microsoft Windows XP, Windows Vista, Windows 7, Windows XP Firewall, Windows Vista Firewall, Windows 7 Firewall, Internet Explorer 7, and Internet Explorer 8 posted. 2015.02.25 - USGCB SCAP 1.2 Content Release Candidate 1 for Microsoft Windows XP, Windows Vista, Windows 7, Windows XP Firewall, Windows Vista Firewall, Windows 7 Firewall, Internet Explorer 7, and...

Project Pages https://csrc.nist.gov/projects/united-states-government-configuration-baseline/usgcb-content

The purpose of the United States Government Configuration Baseline (USGCB) initiative is to create security configuration baselines for Information Technology products widely deployed across the federal agencies. Formal definitions of these baseline settings, as well as detailed documentation relating to the settings are provided in the following sub-pages. These pages also provide the supporting reference material for implementing and verifying USGCB settings on target systems. The following list represents the currently available USGCB content, grouped by the product vendor for which the...

Project Pages https://csrc.nist.gov/projects/united-states-government-configuration-baseline/disclaimer

The United States Government Configuration Baseline (USGCB) - Disclaimer Disclaimer for Microsoft Content Do not attempt to implement any of the settings without first testing them in a non-operational environment. These recommendations have only been tested on Windows 7 Ultimate 32-bit, Windows 7 Ultimate 64-bit, Windows 7 Enterprise x86, and Windows 7 Enterprise x64. These settings may be applicable to other Windows systems and service packs; however, NIST has not tested other Windows based systems with these settings. Please see the National Checklist Program (NCP) website for...

Project Pages https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines/example-values

The following is a list of algorithms with example values for each algorithm. This list may not always accurately reflect all Approved* algorithms. Please refer to the actual algorithm specification pages for the most accurate list of algorithms. Encryption - Block Ciphers Visit the Block Cipher Techniques Page FIPS 197 - Advanced Encryption Standard (AES) AES-AllSizes AES-128 AES-192 AES-256 SP 800-67 - Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher TDES FIPS 185 - Escrowed Encryption Standard containing the Skipjack algorithm Skipjack...

Project Pages https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines/crypto-enabled-applications

NIST S/MIME Activities NIST has developed a NIST SP 800-49, Federal S/MIME V3 Client Profile for security and interoperability based on IETF specifications. The profile includes all mandatory features of the (S/MIME V3) IETF RFCs (RFCs 2630 through 2634) with the EXCEPTION that implementation of RFC 2631 Diffie-Hellman Key Agreement cryptographic algorithm mandated in IETF RFC 2630 is NOT required. In addition, the profile mandates certain optional features required for interoperability and security in secure email products. The primary audience is federal agencies, but the profile may be...

Project Pages https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines/archived-crypto-projects

Some content from historical NIST crypto projects is included here: Advanced Encryption Standard (AES) Development Effort

Project Pages https://csrc.nist.gov/projects/circuit-complexity/list-of-circuits

The circuit files with the straight-line programs (SLPs) are stored in our GitHub page, here: https://github.com/usnistgov/Circuits/tree/master/data/slp AES implementations AES S-Boxes Links #ANDs #XOR + #XNOR #Gates Depth AND-Depth S-Box 1 SLP, Graph 32 83 115 28 6 S-Box 2 SLP 32 81 113 27 6 S-Box 3 SLP, Graph 34 94 128 16 4 S-Box inverse 1 SLP 34 87 121 21 4 S-Box inverse 2 SLP, Graph 34 93 127 16 4   AES...

Project Pages https://csrc.nist.gov/projects/circuit-complexity/references

Publications:  2023: M. Sonmez Turan. Optimizing implementations of Boolean Functions. 8th International Workshop on Boolean Functions and their Applications (BFA). Also at ia.cr/2024/133 2022: M. Sonmez Turan. New Bounds on the Multiplicative Complexity of Boolean Functions. 7th International Workshop on Boolean Functions and their Applications (BFA). Also at ia.cr/2022/1077 2021: M. Sonmez Turan, and R. Peralta, On the Multiplicative Complexity of Cubic Boolean Functions. https://ia.cr/2021/1041 2020: Calik, C., Turan, M.S. & Peralta, R. Boolean functions with multiplicative...

Project Pages
64%
https://csrc.nist.gov/projects/lightweight-cryptography/round-1-candidates

In March 2019, NIST received 57 submissions to be considered for standardization. The first round of the NIST lightweight cryptography standardization process began with the announcement of 56 Round 1 Candidates in April 2019 and ended in August 2019.   The status report on the first round is available here. The following table lists the Round 1 Candidates: History of Updates                                              Download all Zip Files (53 MB) does not include IP Statements Candidate Algorithm Information Submitters Comments ACE Zip File...

Project Pages
64%
https://csrc.nist.gov/projects/lightweight-cryptography/round-2-candidates

The second round of the NIST lightweight cryptography standardization process began when NIST announced the 32 Round 2 Candidates in August 2019. Round 2 concluded when the finalists were announced in March 2021. The status report on the second round is available here. The following table lists the Round 2 Candidates:   History of Round 2 Updates Download all Round 2 Zip Files (96 MB)    Candidate Algorithm Information Submitters Comments ACE Zip File (2MB) Specification Changelog Algorithm Update (Sep 2020) Website...

Project Pages https://csrc.nist.gov/projects/lightweight-cryptography/email-list

lwc-forum A lwc-forum@list.nist.gov email mailing list has been established for dialogue regarding NIST's Lightweight Cryptography project. It is an unmoderated mailing list; messages addressed to this list are immediately distributed to all the addresses on the list. Only members are allowed to post messages to the list; however, anyone who wishes to do so may add themselves to the list.  To join: mailto:lwc-forum+subscribe@list.nist.gov You will receive a response message from jupyter+subconfirm@list.nist.gov.  Please click the "Join" link inside that email to confirm your...

Project Pages https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization

Public comments are available for Draft FIPS 203, Draft FIPS 204 and Draft FIPS 205, which specify algorithms derived from CRYSTALS-Dilithium, CRYSTALS-KYBER and SPHINCS+.  The public comment period closed November 22, 2023. Additional Digital Signature Schemes - Round 1 Submissions PQC License Summary & Excerpts   Call for Proposals Announcement (information retained for historical purposes-call closed 11/30/2017) NIST has initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms. Currently, public-key cryptographic...

Project Pages https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-1-submissions

Official comments on the First Round Candidate Algorithms should be submitted using the "Submit Comment" link for the appropriate algorithm. Comments from the pqc-forum Google group subscribers will also be forwarded to the pqc-forum Google group list. We will periodically post and update the comments received to the appropriate algorithm. All relevant comments will be posted in their entirety and should not include PII information in the body of the email message. Please refrain from using OFFICIAL COMMENT to ask administrative questions, which should be sent to pqc-comments@nist.gov...

Project Pages https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization/round-2-submissions

Official comments on the Second Round Candidate Algorithms should be submitted using the "Submit Comment" link for the appropriate algorithm. Comments from the pqc-forum Google group subscribers will also be forwarded to the pqc-forum Google group list. We will periodically post and update the comments received to the appropriate algorithm. All relevant comments will be posted in their entirety and should not include PII information in the body of the email message. Please refrain from using OFFICIAL COMMENT to ask administrative questions, which should be sent to pqc-comments@nist.gov...

Project Pages https://csrc.nist.gov/projects/post-quantum-cryptography/workshops-and-timeline

Workshops Date   April 10-12, 2024 Fifth PQC Standardization Conference (In-Person)           Hilton Washington DC/Rockville Hotel           Rockville, MD Call for Papers November 29- December 1, 2022 Fourth PQC Standardization Conference           Virtual Call for Papers  June 7-9, 2021 Third PQC Standardization Conference           Virtual Call for Papers updated 2/3/2021 August 22-24, 2019 Second PQC Standardization Conference, co-located with Crypto...

Project Pages https://csrc.nist.gov/projects/post-quantum-cryptography/contact-info

For technical inquiries, send e-mail to pqc-comments@nist.gov, or contact: Lily Chen National Institute of Standards and Technology 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930 P: +1 301-975-6974 or via fax at +1 301-975-8670 Email: lily.chen@nist.gov Answers to germane questions will be posted at https://www.nist.gov/pqcrypto. Questions and answers that are not pertinent to this announcement may not be posted. NIST will endeavor to answer all questions in a timely manner.

Project Pages https://csrc.nist.gov/projects/post-quantum-cryptography/email-list

NIST has set up a pqc-forum@list.nist.gov mailing list. The mailing list will be used to discuss the standardization and adoption of secure, interoperable and efficient post-quantum algorithms.  You must be subscribed to send email to the mailing list.  Please use the instructions below to subscribe. To join: mailto:pqc-forum+subscribe@list.nist.gov You will receive a response message from jupyter+subconfirm@list.nist.gov.  Please click the "Join" link inside that email to confirm your subscription request. To unsubscribe: mailto:pqc-forum+unsubscribe@list.nist.gov Mailing List...

Project Pages https://csrc.nist.gov/projects/post-quantum-cryptography/pqc-archive

Historical FAQs Frequently Asked Questions (FAQs) [updated 10/27/2021] Example Files API Notes (March 2017) API Notes (November 2016) API Notes (June 2016) KAT (June 2016) Variable Label Test #2048 (June 2016) Variable Message #2048(June 2016)

Project Pages https://csrc.nist.gov/projects/pec/stppa

The “Special Topics on Privacy and Public Auditability” (STPPA) series is organized by the Privacy Enhancing Cryptography (PEC) project in the Cryptographic Technology Group at NIST-ITL-CSD. A main goal of the series is to gather reference material about "PEC tools", which may facilitate future reflections on aspects of standardization and of development of recommendations/guidelines about advanced cryptography, namely for uses related to privacy and public auditability. Each event will include talks on various interconnected topics, aiming to convey basic technical background, incite...

Project Pages https://csrc.nist.gov/projects/pec/zkproof

NIST has collaborated with the ZKProof initiative since 2019, as a way of supporting the development of open reference material on zero-knowledge proofs. This page lists some outputs of this interaction: News / highlights: 2023-Jan-25: NISTIR 8214C ipd — NIST First Call for Multi-Party Threshold Schemes. Subcategory 2.6 calls for submission of zero-knowledge proofs of knowledge (ZKPoK), and their threshold versions. The participation of the ZKProof community is welcome in three phases: (i) providing feedback about the draft call (till 2023-Apr-10), (ii) submitting ZKPoK schemes, and (iii)...

Project Pages https://csrc.nist.gov/projects/block-cipher-techniques/bcm

A block cipher mode of operation (mode for short) is a method that uses a block cipher to provide an information service, such as confidentiality or authentication. NIST approves the following block cipher modes of the approved block ciphers in the Special Publication (SP) 800-38 series. SP 800-38A specifies the confidentiality modes: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR) modes. Additionally, SP 800-38A Addendum specifies three variants of ciphertext stealing (CS) for the CBC mode: the CBC-CS1, CBC-CS2, and...

Project Pages https://csrc.nist.gov/projects/hash-functions/nist-policy-on-hash-functions

NIST's Policy on Hash Functions - December 15, 2022 December 15, 2022 NIST is announcing a timeline for a transition for SHA-1. See this announcement for details. After 12/31/2030, any FIPS 140 validated cryptographic module that has SHA-1 as an approved algorithm will be moved to the historical list. NIST recommends that federal agencies transition away from SHA-1 for all applications as soon as possible. Federal agencies should use SHA-2 or SHA-3 as an alternative to SHA-1. Further guidance will be available soon. Send questions on the transition to sha-1-transition@nist.gov....

Project Pages https://csrc.nist.gov/projects/hash-functions/sha-3-project

A cryptographic hash algorithm (alternatively, hash "function") is designed to provide a random mapping from a string of binary data to a fixed-size “message digest” and achieve certain security properties. Hash algorithms can be used for digital signatures, message authentication codes, key derivation functions, pseudo random functions, and many other security applications. The Federal Information Processing Standard (FIPS 180-4), Secure Hash Standard, specifies seven cryptographic hash algorithms for Federal use, and is widely adopted by the information technology industry as well. In...

Project Pages https://csrc.nist.gov/projects/key-management/key-management-guidelines

The following publications provide general key management guidance: Recommendation for Key Management SP 800-57 Part 1 Revision 5 - General This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may be provided when using cryptography and the algorithms and key types that may be employed, specifications of the protection that each type of key and other cryptographic information requires and...

Project Pages https://csrc.nist.gov/projects/key-management/key-establishment

The following publications specify methods for establishing cryptographic keys.   Symmetric Block Ciphers SP 800-71, Key Establishment Using Symmetric Block Ciphers (DRAFT) July 2, 2018:  NIST requests public comments on NIST SP 800-71.  Most current key management systems are based on public key cryptography. However, with the emergence of quantum computing technology—which can break many public key algorithms currently in use—symmetric key cryptography may offer alternatives for key establishment. Symmetric key cryptography is more computationally efficient than public key...

<< first   < previous   17     18     19     20     21     22     23     24     25     26     27     28     29     30     31     32     33     34     35     36     37     38     39     40     41  next >  last >>