U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

News & Updates

Showing 76 through 100 of 100 matching records.
January 26, 2018

 A new NIST cybersecurity white paper is available, Security Considerations for Code Signing. 

January 10, 2018

NIST announces the release of Special Publication 800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation.  This document....

October 31, 2017

NIST announces an update to its transition plans for key establishment schemes specified in the SP 800-56 series.

October 2, 2017

NIST's National Cybersecurity Center of Excellence (NCCoE) Releases Draft SP 1800-12, Derived Personal Identity Verification (PIV) Credentials

July 11, 2017

NIST requests comments on the current plan for use and deprecation of the Tripe Data Encryption Algorithm (TDEA).

May 19, 2014

Public Comments: (1) Revised Draft Special Publication 800-73-4, Interfaces for Personal Identity Verification, and (2) Revised Draft Special Publication 800-78-4, Cryptographic Algorithms and Key Sizes for Personal Identity...

March 13, 2014

NIST announces the release of the draft revision of Special Publication 800-56B, Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography. SP 800-56B specifies key-establishment schemes...

December 13, 2013

NIST is pleased to announce that Draft NIST Interagency Report 7863, Cardholder Authentication for the PIV Digital Signature Key, is available for public comment. NISTIR 7863 ...

November 12, 2013

The comment period for Draft Special Publication 800-52 Revision 1, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, has been extended. The new deadline to submit...

September 24, 2013

NIST announces the release of Draft Special Publication (SP) 500-52 (Revision 1), Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations for public comment. 

July 8, 2013

NIST is pleased to announce that Draft NIST Special Publication 800-38G, Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption, is available for public comment. Format-preserving...

May 13, 2013

Draft Special Publication 800-73-4, Interfaces for Personal Identity Verification, and Draft Special Publication 800-78-4, Cryptographic Algorithms and Key Sizes for Personal Identity Verification, are now available 

August 30, 2012
Federal Register Number: 2012-21461

NIST seeks additional comments on specific sections of the 2009 Draft Federal Information Processing Standard 140-3, Security Requirements for Cryptographic Modules… Comments were due October 1, 2012.

August 8, 2012

NIST is developing a draft Special Publication 800-152 that will be entitled "A Profile for U. S. Federal Cryptographic Key Management Systems (CKMS)". This Profile will be based on the Special Publication 800-130, entitled

April 10, 2012

NIST requests comments on proposed changes to Federal Information Processing Standard 186-3, the Digital Signature Standard. The Federal Register Notice requests that electronic comments be sent by May 25, 2012 ...

December 11, 2009
Federal Register Number: E9-29567

NIST announces the Revised Draft Federal Information Processing Standard 140-3, Security Requirements for Cryptographic Modules. Comments must be received on or before March 11, 2010.

September 2, 2008
Federal Register Number: E8-20138

The Secretary of Commerce has approved the withdrawal of ten Federal Information Processing Standards (FIPS), including FIPS 113, Computer Data Authentication.

July 13, 2007
Federal Register Number: E7-13654

This notice announces Draft Federal Information Processing Standard 140-3, Security Requirements for Cryptographic Modules, for public review and comment. The draft standard, designated “Draft FIPS 140-3,” is proposed to...

April 26, 2006

In 2005 Prof. Xiaoyun Wang announced a differential attack on the SHA-1 hash function. NIST found that the attack was practical, and announced plans for transitioning to SHA-2 algorithms and development of SHA-3.

January 12, 2005
Federal Register Number: 05-545

NIST announces that it plans to develop Federal Information Processing Standard (FIPS) 140-3, which will supersede FIPS 140-2, Security Requirements for Cryptographic Modules.

August 25, 2004

Researchers have recently announced they have discovered a new way to break a number of cryptographic hash algorithms. Click here to read NIST's brief comments on recent cryptanalytic attacks on secure hashing functions and...

October 31, 1999
Federal Register Number: 99-28495

NIST announces a workshop to examine public key-based management techniques as specified in ANSI X9.42, X9.44, and X9.63. It will be held at NIST in Gaithersburg, Maryland on February 10-11, 2000.

October 23, 1998
Federal Register Number: 98-28513

NIST proposes the reaffirmation of Federal Information Processing Standard (FIPS) 140-1, Security Requirements for Cryptographic Modules

December 30, 1993

This notice announces that Federal Information Processing Standard (FIPS) 46-1, Data Encryption Standard, has been revised and that the Data Encryption Algorithm specified by the standard has been reaffirmed for five years.

September 11, 1992

This notice announces the review of FIPS 46-1, Data Encryption Standard (DES), inviting comments on potential costs and benefits of reaffirmation, withdrawal, or revision.

<< first   < previous   1     2     3     4