Try the new CSRC.nist.gov and let us know what you think!
(Note: Beta site content may not be complete.)
Application developers depend upon security protocols to establish security services (e.g., to establish a secure tunnel) using cryptography. In turn, these protocols rely on cryptographic infrastructures, such as Kerberos or Public Key Infrastructure (PKI), to manage and distribute cryptographic keys. The Security Technology Group develops and enhances standards, test methods, and guidelines for these critical building blocks in collaboration with international standards organizations, product developers, and Federal agencies. The Security Technology Group also is a key player in the U.S. Federal Government’s PKI deployment activities.