Cryptography (2024)

Cryptography uses mathematical techniques to transform data and prevent it from being read or tampered with by unauthorized parties. That enables exchanging secure messages even in the presence of adversaries. Cryptography is a continually evolving field that drives research and innovation. The Data Encryption Standard (DES), published by NIST in 1977 as aFederal Information Processing Standard(FIPS), was groundbreaking for its time but would fall far short of the levels of protection needed today.

As our electronic networks grow increasingly open and interconnected, it is crucial to have strong, trusted cryptographic standards and guidelines, algorithms and encryption methods that provide a foundation for e-commerce transactions, mobile device conversations and other exchanges of data. NIST has fostered the development of cryptographic techniques and technology for 50 years through an open process which brings together industry, government, and academia to develop workable approaches to cryptographic protection that enable practical security.

Our work in cryptography has continually evolved to meet the needs of the changing IT landscape. Today, NIST cryptographic solutions are used in commercial applications from tablets and cellphones to ATMs, to secure global eCommcerce, to protect US federal information and even in securingtop-secret federal data. NIST looks to the future to make sure we have the right cryptographic tools ready as new technologies are brought from research into operation. For example, NIST is now working on a process to develop new kinds of cryptography to protect our data when quantum computing becomes a reality. At the other end of the spectrum, we are advancing so-called lightweight cryptography to balance security needs for circuits smaller than were dreamed of just a few years ago.

In addition to standardizing and testing cryptographic algorithms used to create virtual locks and keys, NIST also assists in their use. NIST’s validation of strong algorithms and implementations builds confidence in cryptography—increasing its use to protect the privacy and well-being of individuals and businesses.

NIST continues to lead public collaborations for developing modern cryptography, including:

  • Block ciphers,which encrypt data in block-sized chunks (rather than one bit at a time) and are useful in encrypting large amounts of data.
  • Cryptographic hash algorithms,which create short digests, or hashes, of the information being protected. These digests find use in many security applications includingdigital signatures (the development of which NIST also leads).
  • Key establishment,employed inpublic-key cryptographyto establish the data protection keys used by the communicating parties.
  • Post-quantum cryptography,intended to be secure against both quantum and classical computers and deployable without drastic changes to existing communication protocols and networks.
  • Lightweight cryptography,which could be used in small devices such as Internet of Things (IoT) devices and other resource-limited platforms that would be overtaxed by current cryptographic algorithms.
  • Privacy-enhancing cryptography,intended to allow research on private data without revealing aspects of the data that could be used to identify its owner.
  • Digital Signatures, which is an electronic analogue of a written signature that provides assurance that the claimed signatory signed,and the information was not modified after signature generation.
  • Random Bit Generation, which is a device or algorithm that can produce a sequence of bits that appear to be both statistically independent and unbiased.

NIST also promotes the use of validatedcryptographic modules and provides Federal agencies with a security metric to use in procuringequipment containing validated cryptographic modules through other efforts including: FIPS 140, Cryptographic Programs and Laboratory AccreditationCryptographic Module Validation Program (CMVP), Cryptographic Algorithm Validation Program (CAVP), and Applied Cryptography at NIST's National Cybersecurity Center of Excellence (NCCoE).

Post Quantum Encryption

Cryptography (1)

The Journey Toward Quantum Resistant Algorithms: NIST's Initiative

News

Post-Quantum Cryptography: A Q&A With NIST’s Matt Scholl

Quantum computing algorithms seek to use quantum phenomena to perform certain types of calculations much more efficiently than today’s classical, binary, transistor-based computers can. If and when a powerful enough quantum computer is built, it could run algorithms that would break many of the encryption codes we use to protect our data. In this interview with Taking Measure, Matt Scholl, chief

NIST Releases First 3 Finalized Post-Quantum Encryption Standards

NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers

NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices

Cryptography (2024)
Top Articles
5 Impeccable Reasons Node.js Is Great For Startups
Ethical Mobile Phones | Ethical Consumer
Victor Spizzirri Linkedin
Printable Whoville Houses Clipart
What to Do For Dog Upset Stomach
Craigslist Cars And Trucks For Sale By Owner Indianapolis
Cad Calls Meriden Ct
Insidious 5 Showtimes Near Cinemark Tinseltown 290 And Xd
Kansas Craigslist Free Stuff
Lost Ark Thar Rapport Unlock
Richard Sambade Obituary
Music Archives | Hotel Grand Bach - Hotel GrandBach
All Obituaries | Ashley's J H Williams & Sons, Inc. | Selma AL funeral home and cremation
The Blind Showtimes Near Showcase Cinemas Springdale
Blue Beetle Showtimes Near Regal Swamp Fox
Mills and Main Street Tour
Aris Rachevsky Harvard
Allentown Craigslist Heavy Equipment
Rimworld Prison Break
Doublelist Paducah Ky
Free Personals Like Craigslist Nh
Jeffers Funeral Home Obituaries Greeneville Tennessee
Pocono Recird Obits
Sister Souljah Net Worth
Powerschool Mcvsd
Albert Einstein Sdn 2023
Top 20 scariest Roblox games
Wonder Film Wiki
Farm Equipment Innovations
Vht Shortener
Delete Verizon Cloud
Penn State Service Management
Healthy Kaiserpermanente Org Sign On
Astro Seek Asteroid Chart
Puffin Asmr Leak
Moxfield Deck Builder
Ny Post Front Page Cover Today
Tugboat Information
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Rhode Island High School Sports News & Headlines| Providence Journal
Weather In Allentown-Bethlehem-Easton Metropolitan Area 10 Days
Sarahbustani Boobs
Pathfinder Wrath Of The Righteous Tiefling Traitor
Tom Kha Gai Soup Near Me
UWPD investigating sharing of 'sensitive' photos, video of Wisconsin volleyball team
Ups Customer Center Locations
Iron Drop Cafe
Muni Metro Schedule
Washington Craigslist Housing
10 Bedroom Airbnb Kissimmee Fl
Vcuapi
Latest Posts
Article information

Author: Carlyn Walter

Last Updated:

Views: 6180

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Carlyn Walter

Birthday: 1996-01-03

Address: Suite 452 40815 Denyse Extensions, Sengermouth, OR 42374

Phone: +8501809515404

Job: Manufacturing Technician

Hobby: Table tennis, Archery, Vacation, Metal detecting, Yo-yoing, Crocheting, Creative writing

Introduction: My name is Carlyn Walter, I am a lively, glamorous, healthy, clean, powerful, calm, combative person who loves writing and wants to share my knowledge and understanding with you.