An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Ramaswamy Chandramouli, Simson L. Garfinkel, J. S. Nightingale, Scott W. Rose
This document gives recommendations and guidelines for enhancing trust in email. The primary audience includes enterprise email administrators, information...
This document is part of a series intended to provide guidance to the Federal Government for using cryptography and NIST's cryptographic standards to protect...
This document is intended to provide guidance to the Federal Government for using cryptography and NIST's cryptographic standards to protect sensitive, but...
The document describes the procedure by which fingerprint image downsampling procedures will be evaluated with respect to conformance to the NIST guidance for...
Amanda J. Moors, Rebecca S. Pugh, Jody R. Evans, Jennifer M. Ness, Debra L. Ellisor, Melannie J. Bachman
The NIST Reference Materials Production (RMP) Facility at the Hollings Marine Laboratory produces fresh, frozen powder materials which are used as Standard...
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public...
For many organizations, their employees, contractors, business partners, vendors, and/or others use enterprise telework or remote access technologies to perform...
Many people telework, and they use a variety of devices, such as desktop and laptop computers, smartphones, and tablets, to read and send email, access websites...
System primitives allow formalisms, reasoning, simulations, and reliability and security risk-tradeoffs to be formulated and argued. In this work, five core...
This report describes an equivalent volume measurement method using optical microscopy for estimating the mean volume of nominally 100 um diameter spherical...
John A. Dagata, Premsagar P. Kavuri, Andras Vladar, Kensei Ehara, Natalia Farkas, Chung-Lin Wu, Hiroshi Itoh
This report presents a correlated height and width measurement model for particle size analysis of spherical particles by atomic force microscopy (AFM). It is...
David Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Nabil Ghadiali, Jason Mohler, Steven Brady
NIST Special Publication (SP) 800-157 contains technical guidelines for the implementation of standards-based, secure, reliable, interoperable Public Key...
Hildegard Ferraiolo, Ramaswamy Chandramouli, Ketan L. Mehta, Jason Mohler, Stephen Skordinski, Steven Brady
This document provides a common XML-based data representation of a chain-of-trust record to facilitate the exchange of PIV Card enrollment data. The exchanged...
Fractography is a powerful tool for the analysis of fractured glasses and ceramics. It is applicable to fractures created under controlled conditions in the...
John M. Libert, Shahram Orandi, Michael D. Garris, Frederick R. Byers, John D. Grantham
The document describes the procedure by which applications of JPEG 2000 CODECs will be evaluated with respect to conformance to the NIST guidance for...
David Cooper, Hildegard Ferraiolo, Ramaswamy Chandramouli, Jason Mohler
NIST Special Publication (SP) 800-73 contains the technical specifications to interface with the smart card to retrieve and use the Personal Identity...
This Recommendation specifies two methods, called FF1 and FF3, for format-preserving encryption. Both of these methods are modes of operation for an underlying...
Consisting of a 1 m long piece of 0.5 mm diameter platinum wire, SRM 1967a meets the requirements for a thermoelectric reference material for temperatures from...
Virtual Machines (VMs) are key resources to be protected since they are the compute engines hosting mission-critical applications. Since VMs are end-nodes of a...
Bilal Ayyub, Robert E. Chapman, Gearald Galloway, Richard Wright
This report documents the effort launched by the National Institute of Standards and Technology (NIST) to develop, organize, and convene a workshop on the...
John P. Wack, Kim Brace, Samuel Dana, Herb Deutsch, John Dziurlaj, Ian Piper, Don Rehill, Richard M. Rivello, Sarah Whitt
This publication describes an election results common data format specification for pre-election setup information and post-election results reporting. It...
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the...
Aaron Johnson, Rodney Bryant, Tamae Wong, James Whetstone, Eric Harman, Woong Kang, Keith Gillis, Hsin-Hung Lee, Iosif Shinder, Liang Zhang
On April 20-21, 2015, NIST hosted a workshop that, through measurement science, enabled the owners of stationary sources (primarily the electric power industry)...