*
Bookmark and Share

Cryptographic Applications and Infrastructures

Summary:

Application developers depend upon security protocols to establish security services (e.g., to establish a secure tunnel) using cryptography. In turn, these protocols rely on cryptographic infrastructures, such as Kerberos or Public Key Infrastructure (PKI), to manage and distribute cryptographic keys.

Description:

The Cryptographic Technology Group develops and enhances standards, test methods, and guidelines for these critical building blocks in collaboration with international standards organizations, product developers, and Federal agencies. The Cryptographic Technology Group also is a key player in the U.S. Federal Government’s PKI deployment activities.

For more information regarding the Cryptographic Applications and Infrastructures project, please visit the Computer Security Resource Center (CSRC).

 

End Date:

ongoing

Lead Organizational Unit:

ITL

Related Programs and Projects:

  • Public Key Infrastructure (PKI)
  • Crypto-Enabled Applications
  • Computer Security Objects Register (CSOR)
Contact

Tim Polk
301-975-3348

100 Bureau Drive, MS 8930
Gaithersburg, MD 20899-8930