Author(s)
Shirley M. Radack
Abstract
This bulletin summarizes guidance and information that was published by NIST to help organizations select and implement transport level security, making effective use of Federal Information Processing Standards (FIPS) approved cryptographic algorithms and open source technology. The guide, NIST SP 800-32, Guidance for the Selection and Use of Transport Layer Security (TSL) Implementations was written by C. Michael Chernick (NIST), Charles Edington III (Booz Allen Hamilton), Matthew J. Fanto (NIST), and Rob Rosenthal (Booz Allen Hamilton). SP 800-52 advises organizations how to use authentication, confidentiality and integrity mechanisms to protect information at the transport layer.
Keywords
cryptography, network security, TLS, transport layer security
Citation
Radack, S.
(2005),
Protecting Sensitive Information That is Transmitted Across Networks: NIST Guidance for Selecting and Using Transport Layer Security Implementations, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=150228 (Accessed May 2, 2026)
Additional citation formats
Issues
If you have any questions about this publication or are having problems accessing it, please contact [email protected].