An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
A key-encapsulation mechanism (KEM) is a set of algorithms that can be used by two parties under certain conditions to securely establish a shared secret key
We have investigated the possibility of extracting low- and high-energy reference Charpy specimens, to be certified for the indirect verification of impact
Balasubramanian Muralikrishnan, Katharine Shilling, Mary Gregg, Vincent Lee, Jason Keller, Erin Casey, Eugene Liscio, Bryon O'Neil, Mike Russ, Toby Terpstra
This report describes a terrestrial laser scanner (TLS) testing event, the NIST Measurement Week, held at the National Institute of Standards and Technology
Sherief Elsibaie, Yating Zhang, Juan Fung, Dustin Cook, Siamak Sattar, Peter Morris, Henry Burton, David Welch, Kamiar Anaraki
This report details the development of different structural design building archetypes and other seismic enhancements, the cost estimation process applied to
The Transport Layer Security (TLS) protocol is widely deployed to secure network traffic. TLS 1.3 has been strengthened so that even if a TLS-enabled server is
Multidimensional scaling is a popular technique for visualizing dissimilarities between objects in complex datasets. For a single dataset, different initial
Kevin McGrattan, Isaac Leventon, Scott Bareham, Gabriel Taylor
This report documents a series of fire experiments performed within steel electrical enclosures and on open "ladder back" cable trays. The first objective is to
Business recovery after disasters is a complex process influenced by various factors. By compiling research on business recovery, this work seeks to support
William Fisher, Jason Ajmo, Sudhindra Umarji, Spike Dog, Mark Russell, Karen Scarfone
Most recent cybersecurity breaches have involved compromised credentials. Migrating from single-factor to multi-factor authentication (MFA) reduces the risk of
Michael Fagan, Julie Haney, Daniel Eliot, Barbara Cuthill, Kristina Rigopoulos
This report documents the first SOUPS Design-A-Thon, which was held on August 11th, 2024, and focused on Designing Effective and Accessible Approaches for
The National Institute of Standards and Technology (NIST) Standard Reference Material® (SRM®) 3666 Albumin and Creatinine in Frozen Human Urine is a secondary
Rishabh Venketesh, Deogratias Kibira, Guodong Shao, Matthew Triebe
Digitization in manufacturing is a concept that, while having existed for some time, can now be realized because of advancements in IIoT (Industrial Internet of
This report summarizes the findings of the workforce preparation assessment initiative at the National Institute of Standards and Technology (NIST) using the
Paul Watrobski, Murugiah Souppaya, Joshua Klosterman, William C. Barker, Jeffrey Marron, Blaine Mulugeta
This report describes an approach to capturing and documenting the network communication behavior of Internet of Things (IoT) devices. From this information
Juan Fung, Michael Hall, Jennifer Helgeson, Alden Dima, Anne Andrews, Jennifer Benkstein
This report presents the design and methodology of a survey conducted to evaluate the impact of changes to the organizational publication review policy at the
Morphing of face photographs present a threat to identity processes; for example, two people being able to use one passport. The threat exists in applications
This introductory guide provides small businesses with a high level overview of NIST Special Publication (SP) 800-171 Revision 3, Protecting Controlled
Joshua Bienfang, Thomas Gerrits, Paulina Kuo, Alan Migdall, Sergey Polyakov, Oliver Slattery
The intention of this dictionary is to define relevant terms and metrics used in the characterization of single-photon detectors and sources with the goal to
Justin Richer, James L. Fenton, Naomi Lefkovitz, David Temoshok, Ryan Galluzzo, Andrew Regenscheid, Yee-Yin Choong
This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential
David Temoshok, Yee-Yin Choong, Andrew Regenscheid, Ryan Galluzzo, James L. Fenton, Justin Richer, Naomi Lefkovitz
This guideline focuses on the authentication of subjects who interact with government information systems over networks to establish that a given claimant is a
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Christine Abruzzi, James L. Fenton, Naomi Lefkovitz
This guideline focuses on identity proofing and enrollment for use in digital authentication. During the process of identity proofing, an applicant provides
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Diana Proud-Madruga, Sarbari Gupta, Naomi Lefkovitz
These guidelines cover identity proofing, authentication, and federation of users (such as employees, contractors, or private individuals) interacting with
NIST Handbook 150-3 presents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation
Elizabeth Benham, Kristen Dill, Dinelka Jagoda, Maryanne Amanze, Yoon Thwel
The metric system (International System of Units, SI) is easy to use and learn. The Metric System Estimation Game is a fun, hands-on activity that helps
Alec Saville, Jake Benzing, Fan Zhang, Joseph Aroh, Jordan Weaver, Russell Evans, Nicholas Derimow, Samantha Webster, Nikolas Hrabe, Cassidy Allen, Newell Moser, May Martin, Jason Holm, Christin Aumayr, Tilman Seifert, Michael Hirtler
Supply chain challenges and health concerns have spurred the development of new Co-free, Cr-containing maraging steels with several new alloys already