*
Bookmark and Share

Cryptographic Technology Group

Welcome

Our work in cryptography is making an impact within and outside the Federal government. Strong cryptography improves the security of systems and the information they process. IT users also enjoy the enhanced availability in the marketplace of secure applications through cryptography, Public Key Infrastructure (PKI), and e-authentication. Work in this area addresses such topics as secret and public key cryptographic techniques, advanced authentication systems, cryptographic protocols and interfaces, public key certificate management, biometrics, smart tokens, cryptographic key recovery, and security architectures. This year, the mandated work in the Homeland Security Presidential Directive 12 (HSPD-12) has continued. A few examples of the impact of this work includes changes to Federal employee identification methods, how users authenticate their identity when needing government services online, and the technical aspects of passports issued to U.S. citizens.

CSD collaborates with a number of national and international agencies and standards bodies to develop secure, interoperable security standards. Federal agency collaborators include the Department of Energy, the Department of State, the National Security Agency, and the Communications Security Establishment of Canada, while national and international standards bodies include the American Standards Committee (ASC) X9 (financial industry standards), the International Organization for Standardization (ISO), the Institute of Electrical and Electronic Engineers (IEEE) and the Internet Engineering Task Force (IETF). Industry collaborators include BC5 Technologies, Certicom, Entrust Technologies, Hewlett Packard, InfoGard, Microsoft, NTRU, Pitney Bowes, RSA Security, Spyrus, and Wells Fargo.

Programs/Projects

Security Aspects of Electronic Voting—The Help America Vote Act (HAVA) of 2002 was passed by Congress to encourage the upgrade of voting equipment across the United States. HAVA established the Election Assistance Commission (EAC) and …

E-Authentication—Application developers are faced with a choice of electronic authentication mechanisms based on a wide variety of technologies, including passwords, biometrics, and physical tokens, to perform …

Cryptographic Hash Algorithm Competition—NIST opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm, which converts a variable length message into a short "message digest" that can be used …

NIST Randomness Beacon—NIST is implementing a proof-of-concept prototype of a trusted public source of randomness, conformant to Sp 800-90. The source is designed to provide unpredictability, autonomy, and consistency. …

Cryptographic Applications and Infrastructures—Application developers depend upon security protocols to establish security services (e.g., to establish a secure tunnel) using cryptography. In turn, these protocols rely on cryptographic …

Cryptographic Toolkit—The Computer Security Division's (CSD) Cryptographic Technology Group (CTG) is involved in the development, maintenance, and promotion of a number of standards and guidance that cover a wide …

 
Contact

General Information:
Tim Polk
Phone: 301-975-3348
Fax: 301-975-8670

100 Bureau Drive, M/S 8930
Gaithersburg, MD 20899-8930