Skip to main content

NIST Pubs

Guide to IPsec VPNs

Author(s)
Elaine B. Barker, Quynh H. Dang, Sheila E. Frankel, Karen Scarfone, Paul Wouters
Internet Protocol Security (IPsec) is a widely used network layer security control for protecting communications. IPsec is a framework of open standards for

NIST Privacy Framework: An Overview

Author(s)
Kaitlin R. Boeckl, Naomi B. Lefkovitz
This bulletin summarizes the information found in the voluntary NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management (Version

STEP File Analyzer and Viewer User Guide (Update 6)

Author(s)
Robert R. Lipman, Soonjo Kwon
The STEP File Analyzer and Viewer opens a STEP (ISO 10303 - STandard for Exchange of Product model data) Part 21 file and (1) generates a spreadsheet or CSV

Securing Web Transactions TLS Server Certificate Management

Author(s)
Murugiah P. Souppaya, William A. Haag Jr., Mehwish Akram, William C. Barker, Rob Clatterbuck, Brandon Everhart, Brian Johnson, Alexandros Kapasouris, Dung Lam, Brett Pleasant, Mary Raguso, Susan Symington, Paul Turner, Clint Wilson, Donna F. Dodson
Transport Layer Security (TLS) server certificates are critical to the security of both internet- facing and private web services. Despite the critical

Analysis of Iris Images from Twins Day – 2010

Author(s)
James R. Matey, Patrick J. Grother, George W. Quinn
Each year since 1976, the town of Twinsburg, Ohio has held a Twins Day Festival. Over the past 43 years over $77,000$ sets of twins and multiples have attended

NVLAP Carpet and Carpet Cushion

Author(s)
Timothy W. Rasinski
NIST Handbook 150-6 specifies the technical requirements and provides guidance for the accreditation of laboratories under the NVLAP Carpet and Carpet Cushion

Recommendation for Cryptographic Key Generation

Author(s)
Elaine B. Barker, Allen L. Roginsky, Richard Davis
Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to

IoT Device Cybersecurity Capability Core Baseline

Author(s)
Michael J. Fagan, Katerina N. Megas, Karen Scarfone, Matthew Smith
Device cybersecurity capabilities are cybersecurity features or functions that computing devices provide through their own technical means (i.e., device

SATE VI Ockham Sound Analysis Criteria

Author(s)
Paul E. Black, Kanwardeep S. Walia
Static analyzers examine the source or executable code of programs to find problems. Many static analyzers use heuristics or approximations to examine programs

NVLAP Thermal Insulation Materials

Author(s)
Timothy W. Rasinski
This handbook is intended for information and use by accredited TIM laboratories, assessors conducting onsite assessments, laboratories seeking accreditation

Space Commerce Workshop Report

Author(s)
Michelle S. Stephens, Nicholas Barbosa, Leah R. Kauffman, Rebecca Dorch, Marcus Holzinger
The Department of Commerce (DOC) Boulder Laboratories (consisting of the National Institute for Standards and Technology, the National Oceanic and Atmospheric