An Update on Cryptographic Standards, Guidelines, and Testing Requirements
Shirley M. Radack
This bulletin discusses the cryptographic methods that have been used to maintain the confidentiality and integrity of information, to verify that information was not changed after it was sent, and to authenticate the originator of the information. As information technology has changed and as new federal requirements have been established to strengthen information technology security, NIST has updated older methods and developed new methods for the application of cryptography. This bulletin discusses current federal requirements and the techniques that are available to help federal agencies use cryptography to protect their information and information systems. It covers information discussed in NIST Special Publication (SP) 800-21, Guideline for Implementing Cryptography in the Federal Government, written by Elaine B. Barker, William C. Barker, and Annabelle Lee, explains new requirements for federal agencies to protect their information systems, and points to current cryptographic standards and techniques that can provide the needed protection.
Cryptographic Module Validation Program, cryptography, digital signatures, encryption, Federal Information Security Management Act, information security, message authentication, Personal Identity Verification
An Update on Cryptographic Standards, Guidelines, and Testing Requirements, ITL Bulletin, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=50822
(Accessed November 30, 2023)