Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 26 - 50 of 204

Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

November 17, 2017
Author(s)
Elaine B. Barker, Nicky W. Mouha
… This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). TDEA is intended to be used with … block cipher, computer security, cryptography, data encryption algorithm, security, triple data encryption

An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme

October 3, 2014
Author(s)
Dustin Moody, Ray A. Perlner, Daniel C. Smith-Tone
… key cryptography has been less than successful at offering encryption schemes which are both secure and efficient. At … Tang, and Ding introduced a promising new multivariate encryption algorithm based on a fundamentally new idea: … differential, encryption, invariant, multivariate public key cryptography …

Development of the Advanced Encryption Standard

August 16, 2021
Author(s)
Miles E. Smid, James Foti
… specifies a cryptographic algorithm known as the Advanced Encryption Standard (AES). The AES was the result of a … Advanced Encryption Standard (AES), consensus process, cryptography, Data Encryption Standard (DES), security requirements, SKIPJACK. … Development of the Advanced Encryption Standard …

Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

January 23, 2012
Author(s)
William C. Barker, Elaine B. Barker
… This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP … Block cipher, computer security, cryptography, data encryption algorithm, security, triple data encryption

Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme

April 10, 2020
Author(s)
Dustin Moody, Ray A. Perlner, Daniel C. Smith-Tone, Daniel C. Apon, Javier Verbel
… Tao et al. introduced the ABC Simple Matrix Scheme for Encryption, a multivariate public key encryption scheme. The scheme boasts great efficiency in encryption and decryption, though it suffers from very large … Multivariate Cryptography, Simple Matrix, encryption, MinRank …

Guidelines for Implementing and Using the NBS Data Encryption Standard

April 1, 1981
Author(s)
Institute for Computer Sciences and Technology National Bureau of Standards
… [Withdrawn May 19, 2005] The Data Encryption Standard (DES) was published as Federal … 46 and FIPS PUB 81 when implementing and using the Data Encryption Standard. They provide information on what encryption is, general guidance on how encryption protects … computer security, cryptography, data integrity, encryption, Federal Information Processing Standards …

Second Advanced Encryption Standard Candidate Conference

September 23, 1999
Author(s)
Morris J. Dworkin
… community gathered in Rome, Italy, for the Second Advanced Encryption Standard Candidate Conference (AES2). AES2 was the … sponsored by NIST in its effort to develop a new encryption standard for the U.S. government. There are … AES, AES2, block cipher, CAST-256, crypton, deal, DFC, E2, encryption

Randomness Testing of the Advanced Encryption Standard Candidate Algorithms

September 1, 1999
Author(s)
Juan Soto
… One of the criteria used to evaluate the Advanced Encryption Standard candidate algorithms was their … internal report lists several characteristics which an encryption algorithm exhibiting random behavior should … Advanced Encryption Standard (AES), random number generators, …

Escrowed Encryption Standard

February 9, 1994
Author(s)
National Institute of Standards and Technology (NIST), Miles E. Smid
… [Withdrawn October 19, 2015] This standard specifies an encryption/decryption algorithm and a Law Enforcement Access … Cryptography, Federal Information Processing Standard, encryption, key escrow system, security … Escrowed Encryption Standard …

Enhancements to Data Encryption and Digital Signature Federal Standards

March 4, 1999
Author(s)
Elizabeth B. Lennon
… Information Processing Standards (FIPS): FIPS 46-2, Data Encryption Standard, and FIPS 186, Digital Signature … data encryption standard, DDS, DES, digital signature standard, … Enhancements to Data Encryption and Digital Signature Federal Standards …

Randomness Testing of the Advanced Encryption Standard Finalist Candidates

April 1, 2000
Author(s)
Juan Soto, Lawrence E. Bassham
… and Twofish were selected as finalists for the Advanced Encryption Standard (AES). To evaluate the finalists' … Advanced Encryption Standard (AES), random number generators, … Randomness Testing of the Advanced Encryption Standard Finalist Candidates …

Maintenance Testing for the Data Encryption Standard

August 1, 1980
Author(s)
Jason Gait
… tests for the Federal Information Processing Data Encryption Standard (DES) . The tests consist of an iterative … security, computer security, cryptography, data encryption standard, in-service testing, maintenance tests, … Maintenance Testing for the Data Encryption Standard …

Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard

September 1, 1980
Author(s)
Jason Gait
… implementations of the Federal Information Processing Data Encryption Standard (DES). A particular implementation is … communications security, computer security, cryptography, encryption standard, interface requirements, Monte-Carlo … Correctness of Hardware Implementations of the NBS Data Encryption Standard …

Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard

November 1, 1977
Author(s)
Jason Gait
… implementations of the Federal Information Processing Data Encryption Standard (DES). A particular implementation is … communications security, computer security, cryptography, encryption standard, interface requirements, Monte-Carlo … Correctness of Hardware Implementations of the NBS Data Encryption Standard …

Trust Issues with Opportunistic Encryption

February 28, 2014
Author(s)
Scott W. Rose
… engineers and service operators have begun deploying encryption (often opportunistic) to protect the … The lack of authentication in opportunistic encryption could have the perverse affect of putting more end … of authentication in order to make opportunistic encryption easier to deploy. …

A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code

November 24, 2019
Author(s)
Daniel C. Smith-Tone, Cristina Tone
… We introduce a new technique for building multivariate encryption schemes based on random linear codes. The … schemes can be embedded producing reasonably efficient encryption schemes. Thus this technique offers a bridge … stable and functional for many years, and multivariate encryption, a historically more troubling area. …

New NIST Security Standard Can Protect Credit Cards, Health Information

April 14, 2016
Author(s)
Morris J. Dworkin, Larry Feldman, Gregory A. Witte
… Cipher Modes of Operation: Methods for Format-Preserving Encryption." The publication specifies two methods for format-preserving encryption, FF1 and FF3. … block cipher, confidentiality, encryption, FF1, FF3, format-preserving encryption, information security, mode of operation …

Analysis of VAES3 (FF2)

April 2, 2015
Author(s)
Morris J. Dworkin, Ray A. Perlner
… (NIST) specified three methods for format-preserving encryption (FPE) in Draft NIST Special Publication (SP) … 2013. Each method was a mode of operation of the Advanced Encryption Standard (AES). One of the three modes, VAES3, was … Advanced Encryption Standard, FF2, format-preserving encryption, mode …

Cryptographic Protection for the Twenty-First Century

March 1, 2001
Author(s)
Elaine B. Barker
… and Technology (NIST) announced the selection of a new encryption algorithm that will be used to protect sensitive … This algorithm, to be proposed as the Advanced Encryption Standard (AES), is the result of work conducted by … since 1997. The AES is intended to replace the Data Encryption Standard (DES) that was adopted in 1977 and is now …

Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping

December 13, 2012
Author(s)
Morris J. Dworkin
… publication specifies two new, deterministic authenticated-encryption modes of operation of the Advanced Encryption Standard (AES) algorithm: the AES Key Wrap (KW) … Padding (KWP) mode. An analogous mode with the Triple Data Encryption Algorithm (TDEA) as the underlying block cipher, …

The Advanced Encryption Standard (AES): Raising the Bar for Cryptography

April 1, 2003
Author(s)
William E. Burr
… of Standards and Technology (NIST) selected the Advanced Encryption Standard (AES), a new standard symmetric key encryption algorithm that has been adopted for use by the … The Advanced Encryption Standard (AES): Raising the Bar for Cryptography …
Displaying 26 - 50 of 204
Was this page helpful?