NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Lucy Arendt, Katherine Johnson, Siamak Sattar, Michael Valley, Divya Chandrasekhar, Laurie Johnson, Ryan Kersting
Held in October 2024, the Workshop on Functional Recovery Performance Targets was hosted by the National Institute of Standards and Technology (NIST) and
Michael Powell, Fenimore Philip, Stephanie Saravia
Though portable storage media are convenient, their unregulated use poses cybersecurity risks for organizations utilizing them in their OT environments
Aspasia Nikolaou, Angelos Tsatsis, Maria Antoniou, Juan Fung, Yalda Saadat, Fani Gelogoti, Rallis Kourkoulis, Steven McCabe
The United States (US) faces significant challenges in maintaining and modernizing its aging infrastructure, particularly in the transportation sector, which
Jason Kralj, Kirsten Parratt, Tyler Laird, Stephanie Servetas, Nancy Lin, Dawn Henke, Scott Jackson
In 2020, the National Institute of Standards and Technology (NIST)-led Rapid Microbial Testing Methods (RMTM) Consortium was established to develop standards
Stephanie Servetas, Dawn Henke, Jason Kralj, Kirsten Parratt, Scott Jackson, Nancy Lin
On April 25, 2023, the National Institute of Standards and Technology (NIST) hosted a one-day hybrid workshop focused on bringing together organizations and
Compact face photographs, stored and digitally signed in 2D barcodes, form a low-cost tamper-resistant identity credential. The cryptographic signature allows
Jason Kralj, Nancy Lin, Kirsten Parratt, Stephanie Servetas, Dawn Henke, Scott Jackson
The NIST-led Rapid Microbial Testing Methods (RMTM) Consortium launched in 2020 to develop standards and measurement-based solutions to advance the use of RMTMs
Elaine Barker, John Kelsey, Kerry McKay, Allen Roginsky, Meltem Sonmez Turan
The NIST Special Publication (SP) 800-90 series of documents supports the generation of high-quality random bits for cryptographic and non-cryptographic use. SP
Andrew Iams, James Zuback, Mark Stoudt, Carelyn Campbell
As metals and manufacturing industries continue to transition towards sustainable and circular principals, innovations are needed to address a variety of
A key-encapsulation mechanism (KEM) is a set of algorithms that can be used by two parties under certain conditions to securely establish a shared secret key
The Transport Layer Security (TLS) protocol is widely deployed to secure network traffic. TLS 1.3 has been strengthened so that even if a TLS-enabled server is
The National Institute of Standards and Technology (NIST) Standard Reference Material® (SRM®) 3666 Albumin and Creatinine in Frozen Human Urine is a secondary
This report summarizes the findings of the workforce preparation assessment initiative at the National Institute of Standards and Technology (NIST) using the
This introductory guide provides small businesses with a high level overview of NIST Special Publication (SP) 800-171 Revision 3, Protecting Controlled
Justin Richer, James L. Fenton, Naomi Lefkovitz, David Temoshok, Ryan Galluzzo, Andrew Regenscheid, Yee-Yin Choong
This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential
David Temoshok, Yee-Yin Choong, Andrew Regenscheid, Ryan Galluzzo, James L. Fenton, Justin Richer, Naomi Lefkovitz
This guideline focuses on the authentication of subjects who interact with government information systems over networks to establish that a given claimant is a
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Christine Abruzzi, James L. Fenton, Naomi Lefkovitz
This guideline focuses on identity proofing and enrollment for use in digital authentication. During the process of identity proofing, an applicant provides
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Diana Proud-Madruga, Sarbari Gupta, Naomi Lefkovitz
These guidelines cover identity proofing, authentication, and federation of users (such as employees, contractors, or private individuals) interacting with
Elizabeth Benham, Kristen Dill, Dinelka Jagoda, Maryanne Amanze, Yoon Thwel
The metric system (International System of Units, SI) is easy to use and learn. The Metric System Estimation Game is a fun, hands-on activity that helps
John McGuire, David Sefcik, Katrice Lippa, Scott Dolan, Isabel Baucom
This guide was developed to provide retailers with information about the best practice requirements for the unit pricing of commodities. The guide consists of
Modern enterprise IT systems rely on a family of application programming interfaces (APIs) for integration to support organizational business processes. Hence
Community resilience refers to the concept of a community being able to prepare, respond, recover, and adapt to disruptions in a way that does not compromise
Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be
Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be
Few software development life cycle (SDLC) models explicitly address software security in detail, so secure software development practices usually need to be