ITL BULLETIN FOR SEPTEMBER 2018
AUTOMATED CRYPTOGRAPHIC VALIDATION (ACV) TESTING
Apostol Vassilev, Larry Feldman,1 and Greg Witte,1 Editors
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
U.S. Department of Commerce
The number and complexity of Internet-based breaches continues to climb every year, as documented by the
incidents described in the Verizon 2018 Data Breach Investigations Report (DBIR). That report illustrates that many
of the important products that we depend upon (e.g., databases, web applications, network routers/switches, end-
user devices) are the target of persistent and advanced attacks. Cryptography can be a key defense against such
attacks since even if a system is breached, encrypted data would be useless to the attackers.
The Computer Security Divisi...