Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

What is cryptography?

Cryptography uses mathematical techniques to protect the security of information. As our electronic networks grow increasingly open and interconnected, it is crucial to have strong, trusted cryptographic standards and guidelines, algorithms and encryption methods that can be used for e-commerce transactions, mobile device conversations and other exchanges of data. 

What is NIST's role?

NIST has fostered the development of trustworthy cryptographic techniques and technology for more than 50 years through an open, collaborative process that includes input and expertise from industry, government and academia. 

Our cryptographic standards and guidelines help secure global e-commerce, protect U.S. federal information and top-secret data, and are used in commercial applications from tablets and cellphones to ATMs.

NIST is leading multiple public collaborations focused on meeting modern cryptography needs and improving cryptographic technologies, including:

  • Post-quantum cryptography, including standards that can be implemented now to secure against both quantum and classical computers without drastic changes to existing communication protocols and networks.
  • Block ciphers, which encrypt data in block-sized chunks (rather than one bit at a time) and are useful in encrypting large amounts of data.
  • Cryptographic hash algorithms, which create short digests, or hashes, of the information being protected. These digests find use in many security applications including digital signatures (the development of which NIST also leads).
  • Lightweight cryptography, which could be used in small devices such as Internet of Things (IoT) devices and other resource-limited platforms that would be overtaxed by current cryptographic algorithms.
  • Privacy-enhancing cryptography, intended to allow research on private data without revealing aspects of the data that could be used to identify its owner.
  • Digital signatures, which are electronic analogues of written signatures that provide assurance that the claimed signatory signed, and the information was not modified after signature generation.
  • Random bit generation, which relies on a device or algorithm that can produce a sequence of bits that appear to be both statistically independent and unbiased.

Featured video

The Journey Toward Quantum Resistant Algorithms: NIST's Initiative

The Journey Toward Quantum Resistant Algorithms: NIST's Initiative

News and Updates

NIST Selects HQC as Fifth Algorithm for Post-Quantum Encryption

NIST Releases First 3 Finalized Post-Quantum Encryption Standards

NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers

Blog Posts

Alan Turing’s Everlasting Contributions to Computing, AI and Cryptography

What’s So Great About Quantum Computing? A Q&A With NIST Theorist Alexey Gorshkov

Post-Quantum Cryptography: A Q&A With NIST’s Matt Scholl

View cryptography publications View cryptography research projects
Was this page helpful?