Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 901 - 925 of 1431

Cryptographic Key Management Workshop Summary - June 8-9, 2009

January 8, 2010
Author(s)
Elaine B. Barker, Dennis K. Branstad, Santosh Chokhani, Miles E. Smid
On June 8 and 9, 2009, NIST held a Cryptographic Key Management (CKM) Workshop at its Gaithersburg, Maryland, campus that attracted approximately 80 people attending the workshop in person, with another 75 participating through video conferencing, and an

Proceedings of the Privilege Management Workshop, September 1-3, 2009

January 1, 2010
Author(s)
Tanya L. Brewer, Annie W. Sokol, Sheldon A. Durrant
Privilege management is large and complex, often the source of heated debate and opinion, and fraught with widely-understood, yet ill-defined terminology and concepts. The National Institute of Standards and Technology (NIST) and the National Security

Practical Interdomain Routing Security

November 20, 2009
Author(s)
David R. Kuhn, Simon Liu, Hart Rossman
This article reviews risks and vulnerabilities in interdomain routing, and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and coutermeasures to reduce router

Cybersecurity Fundamentals for Small Business Owners

November 19, 2009
Author(s)
Shirley M. Radack
This bulletin summarizes the information that was published in NIST Interagency Report (NISTIR) 7621, Small Business Information Security: The Fundamentals, by Richard Kissel. The publication presents three major areas that small businesses should address

Herding, Second Preimage, and Trojan Message Attacks Beyond Merkle-Damgaard

November 3, 2009
Author(s)
Elena Andreeva, Charles Bouillaguet , Orr Dunkelman, John M. Kelsey
In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgaard construction. We extend the herding attack to concatenated hashes, and to certain hash functions that process each

An Analysis of CVSS Version 2 Vulnerability Scoring

October 14, 2009
Author(s)
Karen A. Scarfone, Peter M. Mell
The Common Vulnerability Scoring System (CVSS) is a specification that is used to measure the relative severity of software vulnerabilities. CVSS version 2, which was finalized in June 2007, was designed to address several deficiencies discovered during

Mobile Forensic Reference Materials: a Methodology and Reification

October 14, 2009
Author(s)
Wayne Jansen, Aurelien M. Delaitre
This report concerns the theoretical and practical issues with automatically populating mobile devices with reference test data for use as reference materials in validation of forensic tools. It describes an application and data set developed to populate

Open Issues in Secure DNS Deployment

October 6, 2009
Author(s)
Ramaswamy Chandramouli, Scott W. Rose
This paper describes some practical administrative issues and challenges in the deployment of DNSSEC - an IETF specified suite of security measures for securing the Domain Name System (DNS). The issues covered include: (a) Choice of Cryptographic

System and Network Security Acronyms and Abbreviations

September 30, 2009
Author(s)
Karen A. Scarfone, Victoria Thompson
This report contains a list of selected acronyms and abbreviations for system and network security terms with their generally accepted or preferred definitions. It is intended as a resource for Federal agencies and other users of system and network

Guidelines on Firewalls and Firewall Policy

September 28, 2009
Author(s)
Karen A. Scarfone, Paul Hoffman
Firewalls are devices or programs that control the flow of network traffic between networks or hosts employing differing security postures. This publication provides an overview of several types of firewall technologies and discusses their security

Desirable Properties of Voting Systems

September 25, 2009
Author(s)
Svetlana Z. Lowry, Poorvi Vora
This paper provides definitions for some desirable properties of voting systems, including auditability, ballot secrecy, incoercibility, usability and accessibility. In the context of these desirable properties, it defines the class of end-to-end

Recommendation for Digital Signature Timeliness

September 23, 2009
Author(s)
Elaine B. Barker
Establishing the time when a digital signature was generated is often a critical consideration. A signed message that includes the (purported) signing time provides no assurance that the private key was used to sign the message at that time unless the

Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition

September 23, 2009
Author(s)
Andrew R. Regenscheid, Ray A. Perlner, Shu-jen H. Chang, John M. Kelsey, Mridul Nandi, Souradyuti Paul
The National Institute of Standards and Technology is in the process of selecting a new cryptographic hash algorithm through a public competition. The new hash algorithm will be referred to as SHA-3 and will complement the SHA-2 hash algorithms currently

Use of ISO/IEC 24727

August 14, 2009
Author(s)
Hildegard Ferraiolo, Teresa T. Schwarzhoff, William I. MacGregor, Hung Dang, Ketan Mehta
This document describes the use of ISO/IEC 24727 in enabling client-applications to access identity credentials issued by different credential issuers.
Displaying 901 - 925 of 1431