[go: up one dir, main page]

Barker, 2016 - Google Patents

Cryptographic Standards in the Federal Government: Cryptographic Mechanisms

Barker, 2016

View PDF
Document ID
2869203575093946545
Author
Barker E
Publication year
Publication venue
NIST Special Publication

External Links

Snippet

This document is intended to provide guidance to the Federal government for using cryptography and NIST's cryptographic standards to protect sensitive, but unclassified digitized information during transmission and while in storage. The cryptographic methods …
Continue reading at www.gocs.de (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
Barker Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms
Barker et al. Nist special publication 800-57 part 1, revision 4
Barker et al. Recommendation for cryptographic key generation
Barker et al. NIST special publication 800-57
US7516321B2 (en) Method, system and device for enabling delegation of authority and access control methods based on delegated authority
US20110107105A1 (en) Message sending/receiving method
Yasin et al. Cryptography based e-commerce security: a review
KR20250060939A (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
US20050005121A1 (en) Cryptographic method and apparatus
US20050005100A1 (en) Cryptographic method and system
JP6041864B2 (en) Method, computer program, and apparatus for data encryption
Garg et al. Comparison of asymmetric algorithms in cryptography
Akter et al. RSA and AES based hybrid encryption technique for enhancing data security in cloud computing
Khatarkar et al. A survey and performance analysis of various RSA based encryption techniques
Klimushyn et al. Hardware support procedures for asymmetric authentication of the internet of things
Barker Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
Kumar et al. An efficient implementation of digital signature algorithm with SRNN public key cryptography
Sjöberg Post-quantum algorithms for digital signing in Public Key Infrastructures
Jain et al. Secure communication using RSA algorithm for network environment
Modares et al. Make a Secure Connection Using Elliptic Curve Digital Signature
Tanwar Basics of cryptographic primitives for blockchain development
Bermejo Higuera et al. Introduction to Cryptography in Blockchain
Banday Easing PAIN with digital signatures
Satya Bhavani et al. A Proficient Digital Signature Scheme Using Lightweight Cryptography
Chałupnik et al. Correspondent sensitive encryption standard (CSES) algorithm in insecure communication channel