CARVIEW |
This is a potential security issue, you are being redirected to https://csrc.nist.gov.

An official website of the United States government
Here’s how you know
Official websites use .gov
A
.gov website belongs to an official government
organization in the United States.
Secure .gov websites use HTTPS
A
lock (
) or https:// means you’ve safely connected to
the .gov website. Share sensitive information only on official,
secure websites.
Cryptographic Standards and Guidelines
Project Links
Overview
Crypto Standards and Guidelines Activities
- Block Cipher Techniques
- Crypto Publications Review
- Digital Signatures
- Hash Functions
- Interoperable Randomness Beacons
- Key Management
- Lightweight Cryptography (LWC)
- Message Authentication Codes (MACs)
- Multi-Party Threshold Cryptography
- Post-quantum Cryptography (PQC)
- Privacy-Enhancing Cryptography (PEC)
- Random Bit Generation
Additional Cryptographic Research
- Circuit Complexity
- Elliptic Curve Cryptography
- Masked Circuits
- Pairing-Based Cryptography
- We also host a Crypto Reading Club.
Implementation-related References
- Cryptographic Algorithm Validation Program (CAVP)
- Examples with Intermediate Values
- Object Identifiers (OIDs): Computer Security Objects Register (CSOR)
- PKI Testing
Guideline for Using Cryptography in the Federal Government
- Directives, mandates and policies (SP 800-175A)
- Cryptographic mechanisms (SP 800-175B Revision 1)
Cryptographic Standards and Guidelines Development Process
Learn about NIST's process for developing crypto standards and guidelines in NISTIR 7977 and on the project homepage. NIST now also has a Crypto Publication Review Project for reviewing cryptographic publications that were published more than five years ago.
Project Links
Additional Pages
Group
Cryptographic TechnologyRelated Projects
Block Cipher TechniquesCircuit Complexity
Computer Security Objects Register
Crypto Publication Review Project
Crypto Reading Club
Crypto Standards Development Process
Cryptographic Algorithm Validation Program
Digital Signatures
Elliptic Curve Cryptography
Hash Functions
Key Management
Lightweight Cryptography
Message Authentication Codes
Multi-Party Threshold Cryptography
Pairing-Based Cryptography
Post-Quantum Cryptography
Privacy-Enhancing Cryptography
Random Bit Generation
Additional Pages
Example Values Crypto-Enabled Applications Archived Crypto Projects AES Development
Contacts
Inquiries
[email protected]
Andrew Regenscheid
Group
Cryptographic TechnologyRelated Projects
Block Cipher Techniques
Circuit Complexity
Computer Security Objects Register
Crypto Publication Review Project
Crypto Reading Club
Crypto Standards Development Process
Cryptographic Algorithm Validation Program
Digital Signatures
Elliptic Curve Cryptography
Hash Functions
Key Management
Lightweight Cryptography
Message Authentication Codes
Multi-Party Threshold Cryptography
Pairing-Based Cryptography
Post-Quantum Cryptography
Privacy-Enhancing Cryptography
Random Bit Generation