We research, develop, engineer, and produce guidelines, recommendations and best practices for cryptographic algorithms, methods, and protocols.
The Cryptographic Technology (CT) Group’s work in cryptographic mechanisms addresses topics such as hash algorithms, symmetric and asymmetric cryptographic techniques, key management, authentication, and random number generation. Strong cryptography is used to improve the security of information systems and the information they process. Users then take advantage of the availability of secure applications in the marketplace made possible by the appropriate use of standardized, high quality cryptography.
Staff Listing and Profiles
Cryptographic Standards and Guidelines
- Cryptographic standards and guidelines (by project area)
- Implementation-related references (test vectors & object identifiers)
- Guideline for using cryptography in the Federal Government
- Cryptographic standards development process
- Circuit complexity
- Elliptic curve cryptography
- Lightweight cryptography
- Pairing-based cryptography
- Post-quantum cryptography
- Privacy-enhancing cryptography