Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Pubs

Implementing a Zero Trust Architecture: High-Level Document

Author(s)
Alper Kerman, Oliver Borchert, Gema Howell, Scott Rose, Murugiah Souppaya, Jason Ajmo, Yemi Fashina, Parisa Grayeli, Joseph Hunt, Jason Hurlburt, Nedu Irrechukwu, Joshua Klosterman, Oksana Slivina, Susan Symington, Allen Tan, Karen Scarfone, William Barker, Peter Gallagher, Aaron Palermo, Madhu Balaji, Adam Cerini, Rajarshi Das, Jacob Barosin, Kyle Black, Scott Gordon, Jerry Haskins, Keith Luck, Dale McKay, Sunjeet Randhawa, Brian Butler, Mike Delaguardia, Matthew Hyatt, Randy Martin, Peter Romness, Corey Bonnell, Dean Coclin, Ryan Johnson, Dung Lam, Darwin Tolbert, Tim Jones, Tom May, Christopher Altman, Alex Bauer, Marco Genovese, Andrew Campagna, John Dombroski, Adam Frank, Nalini Kannan, Priti Patil, Harmeet Singh, Mike Spisak, Krishna Yellepeddy, Nicholas Herrmann, Corey Lund, Farhan Saifudin, Madhu Dodda, Tim LeMaster, Ken Durbin, James Elliott, Earl Matthews, David Pricer, Joey Cruz, Tarek Dawoud, Carmichael Patton, Alex Pavlovsky, Brandon Stephenson, Clay Taylor, Bob Lyons, Vinu Panicker, Peter Bjork, Hans Drolshagen, Imran Bashir, Ali Haider, Nishit Kothari, Sean Morgan, Seetal Patel, Norman Wong, Zack Austin, Shawn Higgins, Rob Woodworth, Mitchell Lewars, Bryan Rosensteel, Don Coltrain, Wade Ellery, Deborah McGinn, Frank Briguglio, Ryan Tighe, Chris Jensen, Joshua Moll, Jason White, Joe Brown, Gary Bradt, Jeffrey Adorno, Syed Ali, Bob Smith
A zero trust architecture (ZTA) enables secure authorized access to enterprise resources that are distributed across on-premises and multiple cloud environments...

Metrics and Methodology for Hardware Security Constructs

Author(s)
Sanjay Rekhi, Kostas Amberiadis, Abir Ahsan Akib, Ankur Srivastava
Although hardware is commonly believed to be security-resilient, it is often susceptible to vulnerabilities arising from design and implementation flaws. These...

Implications of the Bullet Black Box Study

Author(s)
Bullet Black Box Working Group
The Bullet Black Box Working Group (BulletBB-WG) was convened to review the results of the NIST-Noblis Bullet Black Box Study, and assess the implications of...

NIST Special Publication 260 NIST.SP.260-256 Certification of Standard Reference Material®s 3672a & 3673a: Organic Contaminants in Smokers' Urine (Frozen) & Organic Contaminants in Non-Smokers' Urine (Frozen)

Author(s)
Ashley Russell, Carolyn Burdette, Johanna Camara, Nathanael Heckert, Jennifer Hoguet, Kevin Huncik, Jared Ragland, Elena Wood
Standard Reference Material (SRM) 3672a Organic Contaminants in Smokers' Urine (Frozen) and SRM 3673a Organic Contaminants in Non-Smokers' Urine (Frozen) are...

MEMSDuino: An Arduino-Based MEMS Switch Controller

Author(s)
Lafe Spietz, Adam Sirois, Nathan Flowers-Jacobs, Peter Hopkins, Samuel Benz, Steve Waltman
Radio frequency cryogenic switches are a critical enabling technology for quantum information science, both for calibration and high throughput testing of...

The Burning Characteristics of 3 m to 6 m Dry Douglas-Fir Trees

Author(s)
Erik Johnsson, Giovanni Di Cristina Torres, Eric Mueller, Matthew Bundy, Anthony Chakalis, Marco Fernandez, Anthony Hamins
A series of experiments are reported on the burning behavior of dry, 3 m to 6 m tall, Douglas fir trees. The measurements were conducted in the open under quasi...

A Plan for Global Engagement on AI Standards

Author(s)
Jesse Dunietz, Mark Latonero, Kathleen Roberts
This plan has been developed by the Department of Commerce in coordination with the Department of State and agencies across the U.S. Government. It reflects...

Wind-Driven Fire Spread to a Structure from Landscape Timbers

Author(s)
Erik Johnsson, Kathryn Butler, Marco Fernandez, Wei Tang, Shonali Nazare, Philip Deardorff, Sebastian Arana, Alexander Maranghides
NIST is studying how combustible landscape features around a home burn to better understand their levels of hazard and potential roles in spreading wildland...

Guia Breve sobre la Incertidumbre de Medicion

Author(s)
Antonio Possolo, Maria Victoria Gelabert, David Hibbert, Jürgen Stohner, Olha Bodnar, Juris Meija
Esta Guía Breve reintroduce a los lectores en los principales conceptos y herramientas técnicas utilizadas para la evaluación y expresión de la incertidumbre de...

Requirements for Cryptographic Accordions

Author(s)
Yu Long Chen, Michael Davidson, Morris Dworkin, John Kelsey, Yu Sasaki, Meltem Sonmez Turan, Alyssa Thompson, Nicky Mouha, Donghoon Chang
This report introduces the cryptographic accordion as a tweakable, variable-input-length strong pseudorandom permutation (VIL-SPRP) that is constructed from an...
Was this page helpful?