Documents in the NTIS Technical Reports collection are the results of federally funded research. They are directly submitted to or collected by NTIS from Federal agencies for permanent accessibility to industry, academia and the public.  Before purchasing from NTIS, you may want to check for free access from (1) the issuing organization's website; (2) the U.S. Government Printing Office's Federal Digital System website http://www.gpo.gov/fdsys; (3) the federal government Internet portal USA.gov; or (4) a web search conducted using a commercial search engine such as http://www.google.com.
Accession Number PB2013-110315
Title Computer Security Division Annual Report, 2012.
Publication Date Jun 2013
Media Count 98p
Personal Author N/A
Abstract The Cryptographic Technology Groups (CTG) work in cryptographic mechanisms addresses topics such as hash algorithms, symmetric and asymmetric cryptographic techniques, key management, authentication, and random number generation. Strong cryptography is used to improve the security of information systems and the information they process. Users then take advantage of the availability of secure applications in the marketplace made possible by the appropriate use of standardized, high-quality cryptography.
Keywords Automated security tools
Computer networks
Computer security
Computer Security Division(CSD)
Cyber security
Federal government agencies
Metrics
Standards
Trustworthy networking
Validation programs

 
Source Agency National Institute of Standards and Technology
NTIS Subject Category 62 - Computers, Control & Information Theory
70B - Management Practice
Corporate Author National Inst. of Standards and Technology (ITL), Gaithersburg, MD. Computer Security Div.
Document Type Technical report
Title Note Special pub.
NTIS Issue Number 1322
Contract Number N/A

Science and Technology Highlights

See a sampling of the latest scientific, technical and engineering information from NTIS in the NTIS Technical Reports Newsletter

Acrobat Reader Mobile    Acrobat Reader