Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Federal Inf. Process. Stds. (NIST FIPS)

Advanced Encryption Standard (AES)

Author(s)
National Institute of Standards and Technology (NIST), Morris J. Dworkin, Meltem Sonmez Turan, Nicky Mouha
In 2000, NIST announced the selection of the Rijndael block cipher family as the winner of theAdvanced Encryption Standard (AES) competition. Three members of

Digital Signature Standard (DSS)

Author(s)
National Institute of Standards and Technology (NIST), Lily Chen, Dustin Moody, Andrew Regenscheid, Angela Robinson
This standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications

Personal Identity Verification (PIV) of Federal Employees and Contractors

Author(s)
National Institute of Standards and Technology (NIST), Hildegard Ferraiolo, Andrew Regenscheid, Salvatore Francomacaro, David Cooper, Ketan Mehta, Annie W. Sokol, David Temoshok, Gregory Fiumara, Justin Richer, James L. Fenton, Johnathan Gloster, nabil anwer
FIPS 201 establishes a standard for a Personal Identity Verification (PIV) system (Standard) that meets the control and security objectives of Homeland Security

Security Requirements for Cryptographic Modules

Author(s)
National Institute of Standards and Technology (NIST), Michael J. Cooper, Kim B. Schaffer
The selective application of technological and related procedural safeguards is an important responsibility of every federal organization in providing adequate

Secure Hash Standard

Author(s)
National Institute of Standards and Technology (NIST), Quynh Dang
This standard specifies hash algorithms that can be used to generate digests of messages. The digests are used to detect whether messages have been changed

Digital Signature Standard (DSS)

Author(s)
National Institute of Standards and Technology (NIST), Elaine Barker
This Standard specifies a suite of algorithms that can be used to generate a digital signature. Digital signatures are used to detect unauthorized modifications

The NIST Rotating Braille Reader for Electronic Books

Author(s)
John W. Roberts, V R. McCrary
¿¿¿We have developed a new technology to reduce the cost of Braille-based information accessibility. Millions of blind and visually impaired people in the US

The Keyed-Hash Message Authentication Code (HMAC)

Author(s)
National Institute of Standards and Technology (NIST), Quynh Dang
This Standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be

Advanced Encryption Standard (AES)

Author(s)
National Institute of Standards and Technology (NIST), Morris J. Dworkin, Elaine Barker, James R. Nechvatal, James Foti, Lawrence E. Bassham, E. Roback, James F. Dray Jr.
The Advanced Encryption Standard (AES) specifies a FIPS-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a

Entity Authentication Using Public Key Cryptography

Author(s)
National Institute of Standards and Technology (NIST), James Foti
[Withdrawn October 19, 2015] This standard specifies two challenge-response protocols by which entities in a computer system may authenticate their identities

Guideline for the Analysis of Local Area Network Security

Author(s)
National Institute of Standards and Technology (NIST), Lisa Carnahan, Shu-jen H. Chang
[Withdrawn October 19, 2015] This guideline discusses threats and vulnerabilities and considers technical security services and security mechanisms.

Standard Security Label for Information Transfer

Author(s)
National Institute of Standards and Technology (NIST), N Nazario
[Withdrawn October 19, 2015] Information Transfer security labels convey information used by protocol entities to determine how to handle data communicated

Escrowed Encryption Standard

Author(s)
National Institute of Standards and Technology (NIST), Miles E. Smid
[Withdrawn October 19, 2015] This standard specifies an encryption/decryption algorithm and a Law Enforcement Access Field (LEAF) creation method which may be