Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Special Publication (NIST SP)

Domain Name System-Based Electronic Mail Security

Author(s)
Scott W. Rose, Karen M. Waltermire, Santos Jha, Chinedum Irrechukwu, William C. Barker
This document describes a security platform for trustworthy email exchanges across organizational boundaries. The project includes reliable authentication of

Recommendation for the Entropy Sources Used for Random Bit Generation

Author(s)
Meltem Sonmez Turan, Elaine B. Barker, John M. Kelsey, Kerry A. McKay, Mary L. Baish, Mike Boyle
This Recommendation specifies the design principles and requirements for the entropy sources used by Random Bit Generators, and the tests for the validation of

Guide to LTE Security

Author(s)
Jeffrey A. Cichonski, Joshua M. Franklin, Michael J. Bartock
Cellular technology plays an increasingly large role in society as it has become the primary portal to the internet for a large segment of the population. One

Road Mapping Workshop Report on Overcoming Barriers to Adoption of Composites in Sustainable Infrastructure

Author(s)
Richard J. Sheridan, Jeffrey W. Gilman, John Busel, David Hartman, Gale A. Holmes, Daniel Coughlin, Paul Kelley, Dustin Troutman, Jim Gutierrez, Charles Bakis, Robert Moser, Ellen Lackey, James R. Fekete, Stephanie S. Watson, Jae Hyun Kim, Aaron M. Forster, Ajay Krishnamurthy, Bharath NMN Natarajan, William O'Donnell
The February 2017 “Road Mapping Workshop on Overcoming Barriers to Adoption of Composites in Infrastructure” brought together designers, manufacturers

The Costs and Losses of Wildfires

Author(s)
Douglas S. Thomas, David T. Butry, Stanley W. Gilbert, David H. Webb, Juan F. Fung
This report enumerates all possible costs of wildfire management and wildfire-related losses. It, further, compiles estimates or proposes methods for estimating

2016 NIST/ITL Cybersecurity Program: Annual Report

Author(s)
Patrick D. O'Reilly, Kristina G. Rigopoulos, Gregory A. Witte, Larry Feldman
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public

Framework for Cyber-Physical Systems: Volume 3, Timing Annex

Author(s)
David A. Wollman, Marc A. Weiss, YaShian Li-Baboud, Edward R. Griffor, Martin J. Burns
Cyber-Physical Systems (CPS) comprise interacting digital, analog, physical, and human components engineered for function through integrated physics and logic

Application Container Security Guide

Author(s)
Murugiah P. Souppaya, John Morello, Karen Scarfone
Application container technologies, also known as containers, are a form of operating system virtualization combined with application software packaging

SI Measurement System Chart

Author(s)
Elizabeth J. Benham
This publication is a colorful chart explaining the 7 base units of the SI (International System of Units) and prefix symbols, featuring the Measurement League

Summary of Workshop Large Outdoor Fires and the Built Environment

Author(s)
Samuel L. Manzello, Raphaele Blanchi, Michael Gollner, Sara McAllister, Eulalia Planas, Guillermo Rein, Pedro Reszka, Sayaka Suzuki
Large outdoor fires present risk to the built environment. In this workshop, presentations highlighted large outdoor fires throughout the world, and explored