Barker, 2016 - Google Patents
Cryptographic Standards in the Federal Government: Cryptographic MechanismsBarker, 2016
View PDF- Document ID
- 2869203575093946545
- Author
- Barker E
- Publication year
- Publication venue
- NIST Special Publication
External Links
Snippet
This document is intended to provide guidance to the Federal government for using cryptography and NIST's cryptographic standards to protect sensitive, but unclassified digitized information during transmission and while in storage. The cryptographic methods …
- 230000005540 biological transmission 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barker | Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms | |
Barker et al. | Nist special publication 800-57 part 1, revision 4 | |
Barker et al. | Recommendation for cryptographic key generation | |
Barker et al. | NIST special publication 800-57 | |
US7516321B2 (en) | Method, system and device for enabling delegation of authority and access control methods based on delegated authority | |
US20110107105A1 (en) | Message sending/receiving method | |
Yasin et al. | Cryptography based e-commerce security: a review | |
KR20250060939A (en) | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys | |
US20050005121A1 (en) | Cryptographic method and apparatus | |
US20050005100A1 (en) | Cryptographic method and system | |
JP6041864B2 (en) | Method, computer program, and apparatus for data encryption | |
Garg et al. | Comparison of asymmetric algorithms in cryptography | |
Akter et al. | RSA and AES based hybrid encryption technique for enhancing data security in cloud computing | |
Khatarkar et al. | A survey and performance analysis of various RSA based encryption techniques | |
Klimushyn et al. | Hardware support procedures for asymmetric authentication of the internet of things | |
Barker | Cryptographic Standards in the Federal Government: Cryptographic Mechanisms | |
Kumar et al. | An efficient implementation of digital signature algorithm with SRNN public key cryptography | |
Sjöberg | Post-quantum algorithms for digital signing in Public Key Infrastructures | |
Jain et al. | Secure communication using RSA algorithm for network environment | |
Modares et al. | Make a Secure Connection Using Elliptic Curve Digital Signature | |
Tanwar | Basics of cryptographic primitives for blockchain development | |
Bermejo Higuera et al. | Introduction to Cryptography in Blockchain | |
Banday | Easing PAIN with digital signatures | |
Satya Bhavani et al. | A Proficient Digital Signature Scheme Using Lightweight Cryptography | |
Chałupnik et al. | Correspondent sensitive encryption standard (CSES) algorithm in insecure communication channel |