Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo
Bookmark and Share

Cryptographic Applications and Infrastructures


Application developers depend upon security protocols to establish security services (e.g., to establish a secure tunnel) using cryptography. In turn, these protocols rely on cryptographic infrastructures, such as Kerberos or Public Key Infrastructure (PKI), to manage and distribute cryptographic keys.


The Cryptographic Technology Group develops and enhances standards, test methods, and guidelines for these critical building blocks in collaboration with international standards organizations, product developers, and Federal agencies. The Cryptographic Technology Group also is a key player in the U.S. Federal Government’s PKI deployment activities.

For more information regarding the Cryptographic Applications and Infrastructures project, please visit the Computer Security Resource Center (CSRC).


End Date:


Lead Organizational Unit:


Related Programs and Projects:

  • Public Key Infrastructure (PKI)
  • Crypto-Enabled Applications
  • Computer Security Objects Register (CSOR)

Tim Polk

100 Bureau Drive, MS 8930
Gaithersburg, MD 20899-8930