CARVIEW |
NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Computer Security Division
We conduct the research, development, and outreach necessary to provide standards and guidelines, mechanisms, tools, metrics, and practices to protect the nation's information and information systems.
The Computer Security Division is one of six technical divisions in the Information Technology Laboratory.
The Computer Security Division (CSD) develops cybersecurity standards, guidelines, tests, and metrics to protect federal information systems. CSD helps to develop innovative security technologies that enhance the nation’s ability to address current and future computer and information security challenges. CSD’s research focuses on cryptography, automation, identity and access management, the Internet of Things, and public safety networks. The Division maintains a Computer Security Resource Center (CSRC), which provides access to NIST's cybersecurity- and information security-related projects, publications, news, and events. CSRC supports U.S. and international stakeholders in government, industry, and academia.

Some engineers predict quantum computers will be a reality within the next 20 years. But it takes at least 20 years to deploy modern public key cryptography infrastructure. NIST is creating cryptographic systems that are secure against both quantum and present-day computers, while also interacting with existing communication protocol networks.

National Vulnerability Database
The National Vulnerability Database grants access to the U.S. Government’s repository of vulnerability management data, represented using the Security Automation Protocol. The data enables automation of vulnerability management, security measurement, and compliance. Users also have access to security checklist references, security-related software flaws, misconfigurations, product names, and impact metrics.

Security Testing, Validation and Measurement
NIST verifies cryptographic modules based on cryptographic standards through the Cryptographic Module Validation Program. Modules validated as conforming to specific standards are accepted by federal agencies for the protection of sensitive information.
For more information regarding the Computer Security Division, visit our group pages and our Computer Security Resource Center.