NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
The understanding of shape and size of the human head and faces is vital for design of facial wear products, such as respirators, helmets, eyeglasses and for ergonomic studies. 3D scanning is used to create 3D databases of thousands of humans from
This bulletin summarizes information about the Risk Management Framework (RMF) and points to NIST standards and guidelines that assist agencies in achieving effective security for their information technology (IT) systems. The RMF guides agencies through a
The CBC-MAC, or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure over an arbitrary domain. There are several secure variants of CBC-MAC, among which
We present an overview of quantum key distribution (QKD), a secure key exchange method based on the quantum laws of physics rather than computational complexity. We also provide an overview of the two most widely used commodity security protocols, IPsec
Many people telework (also known as telecommuting), which is the ability for an organization s employees and contractors to perform work from locations other than the organization s facilities. Teleworkers use various client devices, such as desktop and
The loss of a set of wireless network access resources causes every mobile user that is connected through the failed resources to perform an unanticipated hard handover, resulting in disrupted connections. The users connected to the failed resources can be
Katarina Cicak, Michael S. Allman, Joshua Strong, Kevin Osborn, Raymond W. Simmonds
Low-loss microwave components are used in many superconducting resonant circuits from multiplexed readouts of low-temperature detector arrays to quantum bits. Two-level system (TLS) defects in amorphous dielectric materials cause excess energy loss. In an
This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, including rate adaptation, routing, and topology control. The objective is to
In this paper, we propose a backbone construction scheme over heterogeneous ad hoc networks, where the network nodes have different characteristics such as communication capacity, processing power and energy resource. Most of the wireless backbone
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
We have demonstrated a polarization encoded, fiber-based quantum key distribution system operating at 850 nm in the B92 protocol. With a quantum bit transmission rate i.e. optical pulse driving frequency of 625 MHz and a mean photon number of 0.1, we
Anastase Nakassis, Joshua C. Bienfang, Paul M. Johnson, Alan Mink, D J. Rogers, Xiao Tang, Carl J. Williams
Quantum cryptography asserts that shared secrets can be established over public channels in such a way that the total information of an eavesdropper can be made arbitrarily small with probability arbitrarily close to 1. As we will show below, the current
Xiao Tang, Lijun Ma, Alan Mink, Anastase Nakassis, Hai Xu, Barry J. Hershman, Joshua C. Bienfang, David H. Su, Ronald F. Boisvert, Charles W. Clark, Carl J. Williams
A complete fiber-based polarization encoding quantum key distribution (QKD) system based on the BB84 protocol has been developed at National Institute of Standard and Technology (NIST). The system can be operated at a sifted key rate of more than 4 Mbit/s
Charles D. Fenimore, James H. Yen, John W. Roberts, Hassan A. Sahibzada
We have conducted an evaluation comparing the interpretability potential of two standardized HD formats, 1080p30 and 720p60. Despite the lack of an existing motion image (MI) quality scale akin to the NIIRS scale, we have exploited previous work on MI
NIST has developed a number of complete fiber-based high-speed quantum key distribution QKD)systems that includes an 850 nm QKD system for a local area network (LAN), a 1310 nm QKD system for a metropolitan area network (MAN), and a 3-node quantum network
IT systems have long been at risk from vulnerable software, malicious actions, or inadvertent user errors, in addition to run-of-the-mill natural and human-made disasters. As we discussed in the last issue ( Surviving Insecure IT: Effective Patch
Janice G. Redish, Dana Chisnell, Ethan Newby, Sharon J. Laskowski, Svetlana Z. Lowry
In this study, we compared two ballots that differed only in wording and presentation of the language on the ballots. For Ballot A, we used conventional wording and presentation, taken from typical ballots. For Ballot B, we used plain language wording and
Xiao Tang, Lijun Ma, Sae Woo Nam, Burm Baek, Oliver T. Slattery, Alan Mink, Hai Xu, Tiejun Chang
We have implemented a differential-phase-shift (DPS) quantum key distribution (QKD) system at 1310 nm with superconducting single photon detectors (SSPD). The timing jitter of the SSPDs is small and its dark counts are very low. 1310 nm is an ideal quantum
Nicolas Chevrollier, David W. Griffith, Nada T. Golmie, SuKyoung Lee, Kyungsoo Kim, Hong Kunho, YoonHyuk Kim
In an integrated WLAN and cellular network, if all mobile users whose connections originate in the cellular network migrate to the WLAN whenever they enter the double coverage area, the WLAN will be severely congested and its users will suffer from
Alan Mink, Joshua C. Bienfang, Robert J. Carpenter, Lijun Ma, Barry J. Hershman, Alessandro Restelli, Xiao Tang
We discussed custom instrumentation for high-speed single photon metrology. We focus on the difficulty of GHz data sampling and provide some techniques on how to accomplish it. We also discuss the benefits of field programmable gate arrays as the basis for
This bulletin summarizes the information that was disseminated by the National Institute of Standards and Technology (NIST) in Special Publication (SP) 800-64, Revision 2, Security Considerations in the System Development Life Cycle. This publication was
Supporting seamless handovers between different wireless networks is a challenging issue. One of the most important aspects of a seamless handover is finding a target network and point of attachment (PoA). This is achieved by performing a so-called channel