Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 351 - 375 of 402

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

May 15, 2001
Author(s)
Andrew L. Rukhin, Juan Soto, James R. Nechvatal, Miles E. Smid, Elaine B. Barker, Stefan D. Leigh, M Levenson, M Vangel, D L. Banks, Nathanael A. Heckert, James F. Dray Jr., S C. Vo
[Superseded by SP 800-22 Revision 1a (April 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=906762] This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may

Introduction to Public Key Technology and the Federal PKI Infrastructure

February 26, 2001
Author(s)
D. Richard Kuhn, Vincent C. Hu, William Polk, Shu-jen H. Chang
This publication was developed to assist agency decision-makers in determining if a PKI is appropriate for their agency, and how PKI services can be deployed most effectively within a Federal agency. It is intended to provide an overview of PKI functions

Mobile Agent Security

October 1, 1999
Author(s)
Wayne Jansen, Athanasios T. Karygiannis
Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new host

Modes of Operation Validation System (MOVS): Requirements and Procedures

February 1, 1998
Author(s)
Sharon S. Keller, Miles E. Smid
The National Institute of Standards and Technology (NIST) Modes of Operation Validation System (MOVS) specifies the procedures involved in validating implementations of the DES algorithm in FIPS PUB 46-2 , The Data Encryption Standard (DES) and the

Minimum Interoperability Specification for PKI Components (MISPC), Version 1

January 1, 1998
Author(s)
William E. Burr, Donna F. Dodson, William T. Polk, N Nazario
The Minimum Interoperability Specification for PKI Components (MISPC) supports interoperability for a large scale public key infrastructure (PKI) that issues, revokes and manages X.509 version 3 digital signature public key certificates and version 2

An Introduction to Computer Security: the NIST Handbook

October 2, 1995
Author(s)
Barbara Guttman, E Roback
This handbook provides assistance in securing computer-based resources (including hardware, software, and information) by explaining important concepts, cost considerations, and interrelationships of security controls. It illustrates the benefits of

Telecommunications Security Guidelines for Telecommunications Management Network

October 2, 1995
Author(s)
John Kimmins, Charles Dinkel, Dale Walters
This Telecommunication Security Guideline is intended to provide a security baseline for Network Elements (NEs) and Mediation Devices (MDs) that is based on commercial security needs. In addition, some National Security and Emergency Preparedness (NS/EP)

Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls

December 1, 1994
Author(s)
John P. Wack, Lisa J. Carnahan
This document provides an overview of the Internet and security-related problems. It then provides an overview of firewall components and the general reasoning behind firewall usage. Several types of network access policies are described, as well as

Security in Open Systems

July 1, 1994
Author(s)
Robert H. Bagwill, John Barkley, Lisa J. Carnahan, Shu-jen H. Chang, David R. Kuhn, Paul Markovitz, Anastase Nakassis, Karen J. Olsen, Michael L. Ransom, John P. Wack
The Public Switched Network (PSN) provides National Security and Emergency Preparedness (NS/EP) telecommunications. Service vendors, equipment manufacturers, and the federal government are concerned that vulnerabilities in the PSN could be exploited and

Security Issues in the Database Language SQL

August 2, 1993
Author(s)
William T. Polk, Lawrence E. Bassham
The Database Language SQL (SQL) is a standard interface for accessing and manipulating relational databases. An SQL-compliant database management system (DBMS) will include a minimum level of functionality in a variety of areas. However, many additional

A Guide to the Selection of Anti-Virus Tools and Techniques

December 1, 1992
Author(s)
William T. Polk, Lawrence E. Bassham
Computer viruses continue to pose a threat to the integrity and availability of computer systems. This is especially true for users of personal computers. A variety of anti-virus tools are now available to help manage this threat. These tools use a wide

Automated Tools for Testing Computer System Vulnerability

December 1, 1992
Author(s)
William T. Polk
Computer security "incidents" occur with alarming frequency. The incidents range from direct attacks by both hackers and insiders to automated attacks such as network worms. Weak system controls are frequently cited as the cause, but many of these

Security in ISDN

September 1, 1991
Author(s)
William E. Burr
The Integrated Services Digital Network (ISDN) standards will provide worldwide digital communications service and will play a key role in the transition to electronic documents and business transactions. ISDN has been developed with little thought to
Displaying 351 - 375 of 402
Was this page helpful?