NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
William Fisher, Jason Ajmo, Sudhindra Umarji, Spike Dog, Mark Russell, Karen Scarfone
Most recent cybersecurity breaches have involved compromised credentials. Migrating from single-factor to multi-factor authentication (MFA) reduces the risk of
Michael Fagan, Julie Haney, Daniel Eliot, Barbara Cuthill, Kristina Rigopoulos
This report documents the first SOUPS Design-A-Thon, which was held on August 11th, 2024, and focused on Designing Effective and Accessible Approaches for
The National Institute of Standards and Technology (NIST) Standard Reference Material® (SRM®) 3666 Albumin and Creatinine in Frozen Human Urine is a secondary
Rishabh Venketesh, Deogratias Kibira, Guodong Shao, Matthew Triebe
Digitization in manufacturing is a concept that, while having existed for some time, can now be realized because of advancements in IIoT (Industrial Internet of
This report summarizes the findings of the workforce preparation assessment initiative at the National Institute of Standards and Technology (NIST) using the
Paul Watrobski, Murugiah Souppaya, Joshua Klosterman, William C. Barker, Jeffrey Marron, Blaine Mulugeta
This report describes an approach to capturing and documenting the network communication behavior of Internet of Things (IoT) devices. From this information
Juan Fung, Michael Hall, Jennifer Helgeson, Alden Dima, Anne Andrews, Jennifer Benkstein
This report presents the design and methodology of a survey conducted to evaluate the impact of changes to the organizational publication review policy at the
Morphing of face photographs present a threat to identity processes; for example, two people being able to use one passport. The threat exists in applications
This introductory guide provides small businesses with a high level overview of NIST Special Publication (SP) 800-171 Revision 3, Protecting Controlled
Joshua Bienfang, Thomas Gerrits, Paulina Kuo, Alan Migdall, Sergey Polyakov, Oliver Slattery
The intention of this dictionary is to define relevant terms and metrics used in the characterization of single-photon detectors and sources with the goal to
Justin Richer, James L. Fenton, Naomi Lefkovitz, David Temoshok, Ryan Galluzzo, Andrew Regenscheid, Yee-Yin Choong
This guideline focuses on the use of federated identity and the use of assertions to implement identity federations. Federation allows a given credential
David Temoshok, Yee-Yin Choong, Andrew Regenscheid, Ryan Galluzzo, James L. Fenton, Justin Richer, Naomi Lefkovitz
This guideline focuses on the authentication of subjects who interact with government information systems over networks to establish that a given claimant is a
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Christine Abruzzi, James L. Fenton, Naomi Lefkovitz
This guideline focuses on identity proofing and enrollment for use in digital authentication. During the process of identity proofing, an applicant provides
David Temoshok, Yee-Yin Choong, Ryan Galluzzo, Marie LaSalle, Andrew Regenscheid, Diana Proud-Madruga, Sarbari Gupta, Naomi Lefkovitz
These guidelines cover identity proofing, authentication, and federation of users (such as employees, contractors, or private individuals) interacting with
NIST Handbook 150-3 presents the technical requirements and guidance for the accreditation of laboratories under the National Voluntary Laboratory Accreditation
Elizabeth Benham, Kristen Dill, Dinelka Jagoda, Maryanne Amanze, Yoon Thwel
The metric system (International System of Units, SI) is easy to use and learn. The Metric System Estimation Game is a fun, hands-on activity that helps
Alec Saville, Jake Benzing, Fan Zhang, Joseph Aroh, Jordan Weaver, Russell Evans, Nicholas Derimow, Samantha Webster, Nikolas Hrabe, Cassidy Allen, Newell Moser, May Martin, Jason Holm, Christin Aumayr, Tilman Seifert, Michael Hirtler
Supply chain challenges and health concerns have spurred the development of new Co-free, Cr-containing maraging steels with several new alloys already
This work provides recommendations for best practices that enable simplified, cost-effective interference testing that incorporates relevant aspects of
Lingnan Lin, Natascha Milesi-Ferretti, Glen Glaeser, Kyu Young Kim
Measurement and Uncertainty Analysis of Pressure Losses in a Push-to-Connect Elbow and Coupling The data on pressure losses in an elbow and a coupling are
This report summarizes recent technical work of the Applied and Computational Mathematics Division of the Information Technology Laboratory at the National
Tibor Furtenbacher, Allan Harvey, Attila G Császár
Based on the direct summation technique, improved ideal-gas partition functions and related thermochemical quantities are reported for the parent isotopologues
John McGuire, David Sefcik, Katrice Lippa, Scott Dolan, Isabel Baucom
This guide was developed to provide retailers with information about the best practice requirements for the unit pricing of commodities. The guide consists of
Community resilience planning often requires quantifying and understanding the trade-offs that communities make between the benefits and costs of different
In this work, we propose a comprehensive framework to analyze threats related to semiconductor supply chain. The framework introduces a metric which quantifies
Modern enterprise IT systems rely on a family of application programming interfaces (APIs) for integration to support organizational business processes. Hence