Search CSRC

Use this form to search content on CSRC pages.

For a phrase search, use " "

Showing 1551 through 1575 of 16409 matching records.
Publications Other (Final) June 20, 2020
https://csrc.nist.gov/pubs/other/2020/06/20/rainbow-band-separation-is-better-than-we-thought/final

Abstract: Currently the National Institute of Standards and Technology (NIST) is engaged in a post- quantum standardization effort, analyzing numerous candidate schemes to provide security against the advancing threat of quantum computers. Among the candidates in the second round of the standardization proces...

Publications SP 1800-16 (Final) June 16, 2020
https://csrc.nist.gov/pubs/sp/1800/16/final

Abstract: This NIST Cybersecurity Practice Guide shows large and medium enterprises how to employ a formal TLS certificate management program to address certificate-based risks and challenges. It describes the TLS certificate management challenges faced by organizations; provides recommended best practices fo...

Publications SP 800-133 Rev. 2 (Final) June 4, 2020
https://csrc.nist.gov/pubs/sp/800/133/r2/final

Abstract: Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorith...

Publications IR 8259A (Final) May 29, 2020
https://csrc.nist.gov/pubs/ir/8259/a/final

Abstract: Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device hardware and software). This publication defines an Internet of Things (IoT) device cybersecurity capability core baseline, which is a set of devic...

Publications IR 8259 (Final) May 29, 2020
https://csrc.nist.gov/pubs/ir/8259/final

Abstract: Internet of Things (IoT) devices often lack device cybersecurity capabilities their customers—organizations and individuals—can use to help mitigate their cybersecurity risks. Manufacturers can help their customers by improving how securable the IoT devices they make are by providing necessary cyber...

Publications Other (Final) May 29, 2020
https://csrc.nist.gov/pubs/other/2020/05/29/notes-on-interrogating-random-quantum-circuits/final

Abstract: Consider a quantum circuit that, when fed a constant input, produces a fixed-length random bit-string in each execution. Executing it many times yields a sample of many bit-strings that contain fresh randomness inherent to the quantum evaluation. When the circuit is freshly selected from a special c...

Publications SP 800-204A (Final) May 27, 2020
https://csrc.nist.gov/pubs/sp/800/204/a/final

Abstract: The increasing trend in building microservices-based applications calls for addressing security in all aspects of service-to-service interactions due to their unique characteristics. The distributed cross-domain nature of microservices needs secure token service (STS), key management and encryption...

Publications SP 800-137A (Final) May 21, 2020
https://csrc.nist.gov/pubs/sp/800/137/a/final

Abstract: This publication describes an approach for the development of Information Security Continuous Monitoring (ISCM) program assessments that can be used to evaluate ISCM programs within federal, state, and local governmental organizations and commercial enterprises. An ISCM program assessment provides o...

Publications SP 1800-23 (Final) May 20, 2020
https://csrc.nist.gov/pubs/sp/1800/23/final

Abstract: Industrial control systems (ICS) compose a core part of our nation’s critical infrastructure. Energy sector companies rely on ICS to generate, transmit, and distribute power and to drill, produce, refine, and transport oil and natural gas. Given the wide variety of ICS assets, such as programmable l...

Publications Conference Paper (Final) May 18, 2020
https://csrc.nist.gov/pubs/conference/2020/05/18/defining-actionable-rules-for-verifying-iot-securi/final

Conference: 41st IEEE Symposium on Security and Privacy Abstract: Internet of Things (IoT) is being widely adopted in recent years. Security, however, has lagged behind, as evidenced by the increasing number of attacks that use IoT devices (e.g., an arson that uses a smart oven, burglary via a smart lock). Therefore, the transparency and accountability of those de...

Publications IR 8196 (Final) May 11, 2020
https://csrc.nist.gov/pubs/ir/8196/final

Abstract: Public safety practitioners utilizing the forthcoming Nationwide Public Safety Broadband Network (NPSBN) will have smartphones, tablets, and wearables at their disposal. Although these devices should enable first responders to complete their missions, any influx of new technologies will introduce ne...

Publications SP 800-57 Part 1 Rev. 5 (Final) May 4, 2020
https://csrc.nist.gov/pubs/sp/800/57/pt1/r5/final

Abstract: This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may be provided when using cryptography and the...

Publications IR 8294 (Final) April 29, 2020
https://csrc.nist.gov/pubs/ir/8294/final

Abstract: Electric vehicles are becoming common on the Nation’s roads, and the electric vehicle supply equipment infrastructure (EVSE) is being created to support that growth. The NIST Information Technology Lab (ITL) hosted a one-day symposium to showcase federally funded research into the potential cybersec...

Publications IR 8011 Vol. 4 (Final) April 28, 2020
https://csrc.nist.gov/pubs/ir/8011/v4/final

Abstract: The NISTIR 8011 capability-specific volumes focus on the automation of security control assessment within each individual information security capability. They add tangible detail to the more general overview given in NISTIR 8011 Volume 1, providing a template for transition to a detailed, NIST stan...

Publications Other (Final) April 24, 2020
https://csrc.nist.gov/pubs/other/2020/04/24/protecting-data-from-ransomware-and-other-data-los/final

Abstract: The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) developed this publication to help managed service providers (MSPs) improve their cybersecurity and the cybersecurity of their customers. MSPs have become an attractive target for cyb...

Publications CSWP 13 (Final) (Withdrawn) April 23, 2020

https://csrc.nist.gov/pubs/cswp/13/mitigating-risk-of-software-vulnerabilities-ssdf/final

Abstract: Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be added to each SDLC model to ensure the software being developed is well secured. This white paper recommends a core set of high-level secure s...

Publications Project Description (Final) April 13, 2020
https://csrc.nist.gov/pubs/pd/2020/04/13/5g-cybersecurity-preparing-a-secure-evolution-to-5/final

Abstract: Cellular networks will be transitioning from 4G to 5G, and 5G networks will provide increased cybersecurity protections. This project will identify several 5G use case scenarios and demonstrate for each one how to strengthen the 5G architecture components to mitigate identified risks and meet indust...

Publications Conference Paper (Final) April 10, 2020
https://csrc.nist.gov/pubs/conference/2020/04/10/combinatorial-rank-attacks-against-rectangular-sim/final

Conference: 11th International Workshop on Post-Quantum Cryptography (PQCrypto 2020) Abstract: In 2013, Tao et al. introduced the ABC Simple Matrix Scheme for Encryption, a multivariate public key encryption scheme. The scheme boasts great efficiency in encryption and decryption, though it suffers from very large public keys. It was quickly noted that the original proposal, utilizing square m...

Publications Journal Article (Final) April 9, 2020
https://csrc.nist.gov/pubs/journal/2020/04/narrow-spectrum-software-testing-addressing-comple/final

Journal: Computer Abstract: Combination coverage based testing supplements basic structural coverage based test selection. This provides a sound test engineering method with defensible, quantitative measures of test completeness.

Publications SP 800-175B Rev. 1 (Final) March 31, 2020
https://csrc.nist.gov/pubs/sp/800/175/b/r1/final

Abstract: This document provides guidance to the Federal Government for using cryptography and NIST’s cryptographic standards to protect sensitive but unclassified digitized information during transmission and while in storage. The cryptographic methods and services to be used are discussed.

Publications Project Description (Final) March 30, 2020
https://csrc.nist.gov/pubs/pd/2020/03/30/critical-cybersecurity-hygiene-patching-the-enterp/final

Abstract: Cyber hygiene describes recommended mitigations for the small number of root causes responsible for many cybersecurity incidents. Implementing a few simple practices can address these common root causes. Patching is a particularly important component of cyber hygiene, but existing tools and processe...

Publications Project Description (Final) March 26, 2020
https://csrc.nist.gov/pubs/pd/2020/03/26/validating-the-integrity-of-servers-and-client-dev/final

Abstract: Product integrity and the ability to distinguish trustworthy products is a critical foundation of cyber supply chain risk management (C-SCRM). Authoritative information regarding the provenance and integrity of the components provides a strong basis for trust in a computing device, whether it is a c...

Publications SP 800-140C (Final) (Withdrawn) March 20, 2020

https://csrc.nist.gov/pubs/sp/800/140/c/final

Abstract: NIST Special Publication (SP) 800-140C replaces the approved security functions of ISO/IEC 19790 Annex C. As a validation authority, the Cryptographic Module Validation Program (CMVP) may supersede this Annex in its entirety. This document supersedes ISO/IEC 19790 Annex C and ISO/IEC 24759 6.15.

Publications SP 800-140 (Final) March 20, 2020
https://csrc.nist.gov/pubs/sp/800/140/final

Abstract: NIST Special Publication (SP) 800-140 specifies the modifications of the Derived Test Requirements (DTR) for Federal Information Processing Standard (FIPS) 140-3. SP 800-140 modifies the test (TE) and vendor (VE) evidence requirements of International Organization for Standardization/International E...

Publications SP 800-140A (Final) March 20, 2020
https://csrc.nist.gov/pubs/sp/800/140/a/final

Abstract: NIST Special Publication (SP) 800-140A modifies the vendor documentation requirements of ISO/IEC 19790 Annex A. As a validation authority, the Cryptographic Module Validation Program (CMVP) may modify, add, or delete Vendor Evidence (VE) and/or Test Evidence (TE) as specified under paragraph 5.2 of...

<< first   < previous   51     52     53     54     55     56     57     58     59     60     61     62     63     64     65     66     67     68     69     70     71     72     73     74     75  next >  last >>