* |
Summary:Application developers depend upon security protocols to establish security services (e.g., to establish a secure tunnel) using cryptography. In turn, these protocols rely on cryptographic infrastructures, such as Kerberos or Public Key Infrastructure (PKI), to manage and distribute cryptographic keys. Description:The Cryptographic Technology Group develops and enhances standards, test methods, and guidelines for these critical building blocks in collaboration with international standards organizations, product developers, and Federal agencies. The Cryptographic Technology Group also is a key player in the U.S. Federal Government’s PKI deployment activities. For more information regarding the Cryptographic Applications and Infrastructures project, please visit the Computer Security Resource Center (CSRC).
|
End Date:ongoingLead Organizational Unit:ITLRelated Programs and Projects:
Contact
Tim Polk 100 Bureau Drive, MS 8930 |