CARVIEW |
This is a potential security issue, you are being redirected to https://csrc.nist.gov.

An official website of the United States government
Here’s how you know
Official websites use .gov
A
.gov website belongs to an official government
organization in the United States.
Secure .gov websites use HTTPS
A
lock (
) or https:// means you’ve safely connected to
the .gov website. Share sensitive information only on official,
secure websites.
Cryptographic Technology CT
Mission Statement
Overview
The Cryptographic Technology (CT) Group’s work in cryptographic mechanisms addresses topics such as hash algorithms, symmetric and asymmetric cryptographic techniques, key management, authentication, and random number generation. Strong cryptography is used to improve the security of information systems and the information they process. Users then take advantage of the availability of secure applications in the marketplace made possible by the appropriate use of standardized, high quality cryptography.
Staff Listing and Profiles
Program Areas
Cryptographic Standards and Guidelines
- Cryptographic standards and guidelines (by project area)
- Implementation-related references (test vectors & object identifiers)
- Guideline for using cryptography in the Federal Government
- Cryptographic standards development process
- Circuit complexity
- Elliptic curve cryptography
- Lightweight cryptography
- Pairing-based cryptography
- Post-quantum cryptography
- Privacy-enhancing cryptography
CT Projects
Block Cipher Techniques
Circuit Complexity
Computer Security Objects Register
Crypto Agility
Crypto Publication Review Project
Crypto Reading Club
Crypto Standards Development Process
Cryptographic Standards and Guidelines
Digital Signatures
Elliptic Curve Cryptography
Hash Functions
Hash-Based Signatures
Interoperable Randomness Beacons
Key Management
Lightweight Cryptography
Message Authentication Codes
Multi-Party Threshold Cryptography
Pairing-Based Cryptography
PKI Testing
Post-Quantum Cryptography
PQC Digital Signature Schemes
Privacy-Enhancing Cryptography
Random Bit Generation