NIST logo

Publications Portal

You searched on:
Topic Area: Cybersecurity
Sorted by: title

Displaying records 161 to 170 of 236 records.
Resort by: Date / Title


161. Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
Series: Special Publication (NIST SP)
Report Number: 800-38D
Topic: Cybersecurity
Published: 11/28/2007
Author: Morris J Dworkin
Abstract: This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=51288

162. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007]
Series: Special Publication (NIST SP)
Report Number: 800-38C
Topic: Cybersecurity
Published: 5/1/2004
Author: Morris J Dworkin
Abstract: This Recommendation defines a mode of operation, called Counter with Cipher Block Chaining-Message Authentication Code (CCM), for a symmetric key block cipher algorithm. CCM may be used to provide assurance of the confidentiality and the authenticity ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=150447

163. Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices
Series: Special Publication (NIST SP)
Report Number: 800-38E
Topic: Cybersecurity
Published: 1/18/2010
Author: Morris J Dworkin
Abstract: This document approves the XTS-AES mode of the AES algorithm by reference to IEEE Std 1619-2007, subject to one additional requirement, as an option for protecting the confidentiality of data on storage devices. The mode does not provide authenticat ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=904691

164. Recommendation for Digital Signature Timeliness
Series: Special Publication (NIST SP)
Report Number: 800-102
Topic: Cybersecurity
Published: 9/23/2009
Author: Elaine B Barker
Abstract: Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless th ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=901593

165. Recommendation for Key Derivation Using Pseudorandom Functions
Series: Special Publication (NIST SP)
Report Number: 800-108
Topic: Cybersecurity
Published: 11/12/2008
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of additional keying material from a secret key, either established through a key establishment scheme or shared through some other manner, using pseudorandom functions.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900147

166. Recommendation for Key Derivation through Extraction-then-Expansion
Series: Special Publication (NIST SP)
Report Number: 800-56C
Topic: Cybersecurity
Published: 11/28/2011
Author: Lidong Chen
Abstract: This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key establishment scheme defined in NIST Special Publications 800-56A or 800-56B through an extraction-then-expansion procedure ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909679

167. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt1 Rev 3
Topic: Cybersecurity
Published: 7/10/2012
Authors: Elaine B Barker, William C Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides ba ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910342

168. Recommendation for Key Management - Part 2: Best Practices for Key Management Organization
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt2
Topic: Cybersecurity
Published: 8/25/2005
Authors: William C Barker, Elaine B Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: Best Practices for Key Management Organization, Part 2 of the Recommendation for Key Management is intended primarily to address the needs of system owners and managers. It provides context, principles, and implementation guidelines to assist in imp ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151315

169. Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Series: Special Publication (NIST SP)
Report Number: 800-57 Pt3
Topic: Cybersecurity
Published: 12/28/2009
Authors: Elaine B Barker, William Edward Burr, Alicia Clay Jones, William T Polk, Scott William Rose, Miles E. Smid, Quynh H Dang
Abstract: Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and sec ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903633

170. Recommendation for Obtaining Assurances for Digital Signature Applications
Series: Special Publication (NIST SP)
Report Number: 800-89
Topic: Cybersecurity
Published: 11/30/2006
Author: Elaine B Barker
Abstract: Entities participating in the generation or verification of digital signatures depend on the authenticity of the process. This Recommendation specifies methods for obtaining the assurances necessary for valid digital signatures: assurance of domain p ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=50954



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series