LEADER 03565nam 2200577 450 001 9910698257103321 005 20230306201207.0 024 8 $aGOVPUB-C13-a53a5570f6653eb56ce529f65d6bd35c 035 $a(CKB)2430000000035798 035 $a(NjHacI)992430000000035798 035 $a(OCoLC)70786903 035 $a(OCoLC)927737464 035 $a(EXLCZ)992430000000035798 100 $a20230306d2005 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGuideline for implementing cryptography in the federal government /$fElaine B. Barker, William C. Barker, Annabelle Lee 205 $aSecond edition. 210 1$aGaithersburg, Md. :$cNational Institute of Standards and Technology,$d2005. 215 $a1 online resource (viii, 89 pages) 225 1 $aNIST special publication 300 $aTitle from title screen (viewed on July 20, 2006). 300 $a"December 2005." 320 $aIncludes bibliographical references. 330 $aThis Second Edition of NIST Special Publication (SP) 800-21, updates and replaces the November 1999 edition of Guideline for Implementing Cryptography in the Federal Government. Many of the references and cryptographic techniques contained in the first edition of NIST SP 800-21 have been amended, rescinded, or superseded since its publication. The current publication offers new tools and techniques. NIST SP 800-21 is intended to provide a structured, yet flexible set of guidelines for selecting, specifying, employing, and evaluating cryptographic protection mechanisms in Federal information systems?and thus, makes a significant contribution toward satisfying the security requirements of the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. The current publication also reflects the elimination of the waiver process by the Federal Information Security Management Act (FISMA) of 2002. SP 800-21 includes background information, describes the advantages of using cryptography; defines the role and use of standards and describes standards organizations that are outside the Federal government; describes the methods that are available for symmetric and asymmetric key cryptography; describes implementation issues (e.g., key management); discusses assessments, including the Cryptographic Module Validation Program (CMVP), the Common Criteria (CC), and Certification and Accreditation (C&A); and describes the process of choosing the types of cryptography to be used and selecting a cryptographic method or methods to fulfill a specific requirement. 410 0$aNIST special publication. 531 $aGUIDELINE FOR IMPLEMENTING CRYPTOGRAPHY IN THE FEDERAL GOVERNMENT 606 $aComputer security$xStandards 610 $aCryptographic algorithm 610 $aCryptographic hash function 610 $aCryptographic key 610 $aCryptographic module 610 $aDigital signature 610 $aKey establishment 610 $aKey management 610 $aMessage authentication code 615 0$aComputer security$xStandards. 676 $a005.8 700 $aBarker$b Elaine B.$01352386 702 $aLee$b Annabelle 702 $aBarker$b William C. 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910698257103321 996 $aGuideline for implementing cryptography in the federal government$93174978 997 $aUNINA LEADER 06174nam 22007095 450 001 9910337718403321 005 20251116203245.0 010 $a3-319-90869-3 024 7 $a10.1007/978-3-319-90869-4 035 $a(CKB)4100000005958482 035 $a(MiAaPQ)EBC5501080 035 $a(DE-He213)978-3-319-90869-4 035 $a(PPN)265904374 035 $a(EXLCZ)994100000005958482 100 $a20180827d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTowards Digital Enlightenment $eEssays on the Dark and Light Sides of the Digital Revolution /$fedited by Dirk Helbing 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (230 pages) 311 08$a3-319-90868-5 320 $aIncludes bibliographical references. 327 $aPreface -- The World Today: A Net Assessment, by Dirk Helbing -- Why Our Innovation System Is Failing - and How to Change This, by Dirk Helbing- and How to Change This, by Dirk Helbing -- The Hidden Danger of Big Data, by Carlo Ratti and Dirk Helbing -- Machine intelligence: Blessing or curse? It depends on us!, by Dirk Helbing -- An Extension of Asimov?s Robotics Laws, by Jan Nagler, Jeroen van den Hoven and Dirk Helbing -- Societal, Economic, Ethical and Legal Challenges of the Digital Revolution: From Big Data to Deep Learning, Artificial Intelligence, and Manipulative Technologies, by Dirk Helbing -- Will Democracy Survive Big Data and Artificial Intelligence?, by Dirk Helbing, Bruno S. Frey, Gerd Gigerenzer, Ernst Hafen, Michael Hagner, Yvonne Hofstetter, Jeroen van den Hoven, Roberto V. Zicari, Andrej Zwitter -- Digital Fascism Rising?, by Dirk Helbing -- The Birth of a Digital God, by Dirk Helbing -- To the Elites of the World: Time to Act, by Dirk Helbing -- Why We Need Democracy 2.0 and Capitalism 2.0 to Survive, by Dirk Helbing -- How to Make Democracy Work in the Digital Age, by Dirk Helbing and Stefan Klauser -- The Blockchain Age: Awareness, Empowerment and Coordination, by Jeroen van den Hoven, Johan Pouwelse, Dirk Helbing and Stefan Klauser -- From War Rooms to Peace Rooms: A Proposal for the Pro-Social Use of Big Data Intelligence, by Dirk Helbing and Peter Seele -- New Security Approaches for the 21st Century: How to Support Crowd Security and Responsibility, by Dirk Helbing -- Homo Socialis: The Road Ahead, by Dirk Helbing -- Social Mirror: More Success through Awareness and Coordination, by Dirk Helbing -- Digitization 2.0: A New Game Begins, by Dirk Helbing. 330 $aThis new collection of essays follows in the footsteps of the successful volume Thinking Ahead - Essays on Big Data, Digital Revolution, and Participatory Market Society, published at a time when our societies were on a path to technological totalitarianism, as exemplified by mass surveillance reported by Edward Snowden and others. Meanwhile the threats have diversified and tech companies have gathered enough data to create detailed profiles about almost everyone living in the modern world - profiles that can predict our behavior better than our friends, families, or even partners. This is not only used to manipulate peoples? opinions and voting behaviors, but more generally to influence consumer behavior at all levels. It is becoming increasingly clear that we are rapidly heading towards a cybernetic society, in which algorithms and social bots aim to control both the societal dynamics and individual behaviors.