LEADER 03565nam 2200577 450 001 9910698257103321 005 20230306201207.0 024 8 $aGOVPUB-C13-a53a5570f6653eb56ce529f65d6bd35c 035 $a(CKB)2430000000035798 035 $a(NjHacI)992430000000035798 035 $a(OCoLC)70786903 035 $a(OCoLC)927737464 035 $a(EXLCZ)992430000000035798 100 $a20230306d2005 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGuideline for implementing cryptography in the federal government /$fElaine B. Barker, William C. Barker, Annabelle Lee 205 $aSecond edition. 210 1$aGaithersburg, Md. :$cNational Institute of Standards and Technology,$d2005. 215 $a1 online resource (viii, 89 pages) 225 1 $aNIST special publication 300 $aTitle from title screen (viewed on July 20, 2006). 300 $a"December 2005." 320 $aIncludes bibliographical references. 330 $aThis Second Edition of NIST Special Publication (SP) 800-21, updates and replaces the November 1999 edition of Guideline for Implementing Cryptography in the Federal Government. Many of the references and cryptographic techniques contained in the first edition of NIST SP 800-21 have been amended, rescinded, or superseded since its publication. The current publication offers new tools and techniques. NIST SP 800-21 is intended to provide a structured, yet flexible set of guidelines for selecting, specifying, employing, and evaluating cryptographic protection mechanisms in Federal information systems?and thus, makes a significant contribution toward satisfying the security requirements of the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. The current publication also reflects the elimination of the waiver process by the Federal Information Security Management Act (FISMA) of 2002. SP 800-21 includes background information, describes the advantages of using cryptography; defines the role and use of standards and describes standards organizations that are outside the Federal government; describes the methods that are available for symmetric and asymmetric key cryptography; describes implementation issues (e.g., key management); discusses assessments, including the Cryptographic Module Validation Program (CMVP), the Common Criteria (CC), and Certification and Accreditation (C&A); and describes the process of choosing the types of cryptography to be used and selecting a cryptographic method or methods to fulfill a specific requirement. 410 0$aNIST special publication. 531 $aGUIDELINE FOR IMPLEMENTING CRYPTOGRAPHY IN THE FEDERAL GOVERNMENT 606 $aComputer security$xStandards 610 $aCryptographic algorithm 610 $aCryptographic hash function 610 $aCryptographic key 610 $aCryptographic module 610 $aDigital signature 610 $aKey establishment 610 $aKey management 610 $aMessage authentication code 615 0$aComputer security$xStandards. 676 $a005.8 700 $aBarker$b Elaine B.$01352386 702 $aLee$b Annabelle 702 $aBarker$b William C. 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910698257103321 996 $aGuideline for implementing cryptography in the federal government$93174978 997 $aUNINA