Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1 - 25 of 204

Conference Report First Advanced Encryption Standard (AES) Candidate Conference, Ventura, CA, August 20-22, 1998

January 1, 1999
Author(s)
E Roback, Morris J. Dworkin
… and Technology (NIST) sponsored the First Advanced Encryption Standard (AES) Candidate Conference in Ventura, … use by the private sector, will replace the existing Data Encryption Standard. … First Advanced Encryption Standard (AES) Candidate Conference Report … advanced encryption standard, communications security, computer …

Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard

April 1, 2000
Author(s)
Lawrence E. Bassham
… testing of the Round 2 Candidates for the Advanced Encryption Standard, along with a few observations regarding … advanced encryption standard, ANSI C, cycle count, efficiency, … Proceedings of the 3rd Advanced Encryption Standard (AES) Candidate Conference … of Round 2 Candidate Algorithms for the Advanced Encryption Standard …

Encryption Basics

May 2, 2011
Author(s)
Kevin M. Stine, Quynh H. Dang
… technology capable of providing this type of protection is encryption. Implementing and managing an encryption solution can certainly be complex. This article … to protect patient data with an understanding of basic encryption processes, an awareness of the security properties …

Overview and Considerations of Access Control Based on Attribute Encryption

December 20, 2023
Author(s)
Vincent C. Hu
Encryption technology can be incorporated into access control … attributes, or resource attributes. Traditional public-key encryption requires different data to have different keys … pervasive system environments wish to avoid the public-key encryption's all-or-nothing data access limitation when …

Overview and Considerations of Access Control Based on Attribute Encryption

September 6, 2023
Author(s)
Vincent C. Hu
Encryption technology can be incorporated into access control … attributes, or resource attributes. Traditional public-key encryption requires different data to have different keys … pervasive system environments wish to avoid the public-key encryption's all-or-nothing data access limitation when …

Computer Security and the Data Encryption Standard: Proceedings of the Conference on Computer Security and the Data Encryption Standard

February 1, 1978
Author(s)
Dennis K. Branstad
… in the Conference on Computer Security and the Data Encryption Standard held at the National Bureau of Standards … guidance with respect to computer security and the Data Encryption Standard. Subjects of the papers and presentations … security, applications and implementation of the Data Encryption Standard. The questions raised at the conference …

Status of the Advanced Encryption Standard (AES) Development Effort

October 19, 1999
Author(s)
James Foti
… will be to articulate the status of NIST=s Advanced Encryption Standard (AES) development effort. This … Information Processing Standard (FIPS) for an Advanced Encryption Standard (AES). The culmination of this … multi-stage effort will be a FIPS specifying an Advanced Encryption Algorithm (AEA) - an unclassified, symmetric, …

Advanced Encryption Standard (AES)

November 26, 2001
Author(s)
National Institute of Standards and Technology (NIST), Morris J. Dworkin, Elaine Barker, James R. Nechvatal, James Foti, Lawrence E. Bassham, E. Roback, James F. Dray Jr.
… The Advanced Encryption Standard (AES) specifies a FIPS-approved … can encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible form called … cryptographic algorithm, cryptographic keys, decryption, encryption … Advanced Encryption Standard (AES) …

The Advanced Encryption Standard: A Status Report

August 25, 1999
Author(s)
Elizabeth B. Lennon
… (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive … or more of these algorithms for inclusion in the Advanced Encryption Standard. … advanced encryption standard (AES), cryptanalysis, cryptographic algorithms, cryptography, encryption

Using Storage Encryption Technologies to Protect End User Devices

November 26, 2007
Author(s)
Shirley M. Radack
… The bulletin explains three classes of storage encryption techniques (full disk encryption, volume and virtual disk encryption, and file/folder encryption), the protections … Authentication, cryptography, data storage, encryption, end user devices, Federal Information Processing …

Advanced Encryption Standard (AES)

May 9, 2023
Author(s)
National Institute of Standards and Technology (NIST), Morris J. Dworkin, Meltem Sonmez Turan, Nicky Mouha
… Rijndael block cipher family as the winner of theAdvanced Encryption Standard (AES) competition. Three members of the … AES, block cipher, confidentiality, cryptography, encryption, Rijndael. … Advanced Encryption Standard (AES) …

2F - A New Method for Constructing Efficient Multivariate Encryption Schemes

September 28, 2022
Author(s)
Daniel Smith-Tone
… rank methods, the most prominent schemes, particularly for encryption, are not particularly efficient. In this article … generic construction for building efficient multivariate encryption schemes. Such schemes can be built from maps … attack. We then construct one such efficient multivariate encryption scheme and show it to be about 100 times faster …

HFERP -- A New Multivariate Encryption Scheme

April 1, 2018
Author(s)
Yashuhiko Ikematsu, Ray Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates
… In 2016, Yasuda et al.presented a new multivariate encryption technique based on the Square and Rainbow … space and ciphertext space than most recent multivariate encryption proposals, but proved to be too aggressive and was … multi-HFE, HFE-, for example. We propose a related new encryption scheme retaining the desirable traits of SRP and …

Report on the Development of the Advanced Encryption Standard (AES)

June 1, 2001
Author(s)
James R. Nechvatal, Elaine B. Barker, Lawrence E. Bassham, William E. Burr, Morris J. Dworkin, James Foti, E Roback
… (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive … which will be proposed for inclusion in the Advanced Encryption Standard (AES). The research results and rationale … Advanced Encryption Standard (AES), cryptanalysis, cryptographic …

Report of the NIST Workshop on Key Escrow Encryption

June 1, 1994
Author(s)
A Oldehoeft, Dennis K. Branstad
… a one-day workshop to present and discuss key escrow encryption technology, including the recently-approved Escrowed Encryption Standard (EES), Federal Information Processing … and industry presented the objectives of key escrow encryption, its current method, several alternative methods …

Status Report on the First Round of the Development of the Advanced Encryption Standard

November 17, 1999
Author(s)
James R. Nechvatal, Elaine B. Barker, Donna F. Dodson, Morris J. Dworkin, James Foti, E Roback
… (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive … or more of these algorithms for inclusion in the Advanced Encryption Standard. … Advanced Encryption Standard (AES), cryptanalysis, cryptographic algorithms, cryptography, encryption

Full Disk Encryption: Bridging Theory and Practice

February 3, 2017
Author(s)
Louiza Khati, Nicky Mouha, Damien Vergnaud
… We revisit the problem of Full Disk Encryption (FDE), which refers to the encryption of each sector of a disk volume. In the context of … disk encryption theory, full disk encryption, FDE, XTS, IEEE P1619, unique first block, … Full Disk Encryption: Bridging Theory and Practice …

Guide to Storage Encryption Technologies for End User Devices

November 15, 2007
Author(s)
Karen A. Scarfone, Murugiah P. Souppaya, Matt Sexton
… secured. This publication explains the basics of storage encryption, which is the process of using encryption and authentication to restrict access to and use of stored information. The appropriate storage encryption solution for a particular situation depends …

Fast and Secure CBC Type MAC Algorithms

July 21, 2009
Author(s)
Mridul Nandi
… all s >= 2. Moreover, GCBC2 needs only one block cipher encryption for almost all single block messages, and for all … 16th International Workshop on Fast Software Encryption (FSE 2009) … Fast Software Encryption (Lecture Notes in Computer Science) …

Total Break of the SRP Encryption Scheme

December 23, 2017
Author(s)
Ray A. Perlner, Albrecht R. Petzoldt, Daniel C. Smith-Tone
… Yasuda and Sakurai proposed in [7] a new multivariate encryption scheme called SRP, which combines the Square encryption scheme with the Rainbow signature scheme and the … Multivariate Cryptography, SRP Encryption Scheme, Cryptanalysis, min-Q-Rank … Total Break of the SRP Encryption Scheme …

Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

May 1, 2004
Author(s)
William C. Barker
… data systems. This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38 … subsequently process such protected data. The Triple Data Encryption Algorithm (TDEA) is made available for use by …

Key Recovery Attack on Cubic Simple Matrix Encryption

August 11, 2016
Author(s)
Ray Perlner, Dustin Moody, Daniel Smith-Tone
… cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemes which utilize the structure of a large … of polynomials. The cubic version of the ABC Simple Matrix Encryption was developed with provable security in mind and …

Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme

June 28, 2017
Author(s)
Dustin Moody, Ray A. Perlner, Daniel C. Smith-Tone
… cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemes which utilize the structure of a large … great for the cubic version of the Simple Matrix Encryption Scheme. In this work, we demonstrate a technique …

Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption

March 29, 2016
Author(s)
Morris J. Dworkin
… two methods, called FF1 and FF3, for format-preserving encryption. Both of these methods are modes of operation for … Block cipher, confidentiality, encryption, FF1, FF3, format-preserving encryption, information security, mode of operation … Cipher Modes of Operation: Methods for Format-Preserving Encryption
Displaying 1 - 25 of 204
Was this page helpful?