The use of cryptographic mechanisms is one of the strongest ways to provide security services for electronic applications and protocols and for data storage. The National Institute of Standards and Technology (NIST) publishes Federal Information Processing Standards (FIPS) and NIST Recommendations (which are published as Special Publications) that specify cryptographic techniques for protecting sensitive, unclassified information. Since NIST published the Data Encryption Standard (DES) in 1977, the suite of approved standardized algorithms has been growing. New classes of algorithms have been added, such as secure hash functions and asymmetric key algorithms for digital signatures. The suite of algorithms now provides different levels of cryptographic strength through a variety of key sizes. The algorithms may be combined in many ways to support increasingly complex protocols and applications. This NIST Recommendation applies to U.S. government agencies using cryptography for the protection of their sensitive, unclassified information. This Recommendation may also be followed, on a voluntary basis, by other organizations that want to implement sound security principles in their computer systems. The proper management of cryptographic keys is essential to the effective use of cryptography for security. Keys are analogous to the combination of a safe. If an adversary knows the combination, the strongest safe provides no security against penetration. Similarly, poor key management may easily compromise strong algorithms. Ultimately, the security of information protected by cryptography directly depends on the strength of the keys, the effectiveness of the mechanisms and protocols associated with the keys, and the protection afforded the keys. Cryptography can be rendered ineffective by the use of weak products, inappropriate algorithm pairing, poor physical security, and the use of weak protocols. All keys need to be protected against unauthorized substitution and m
2021-08-25 22:15:37 1.28MB NIST SP800
1
美国NIST《网络安全框架》cybersecurity-framework-021214中英文版
2021-08-24 15:40:27 889KB NIST 网络安全框架
1
信息安全_数据安全_解讀 NIST Cybersecurity Framework: AI 安全防护 安全建设 法律法规 系统安全
NIST REFPROP MATLAB函数的其他工具 描述 该存储库包含MATLAB函数refprop ,它是的后端,而MATLAB函数refpropm本身是NIST REFPROP使用的FORTRAN子例程的后端。 这些FORTRAN例程被编译为MATLAB二进制文件(mex文件)。 不幸的是,这个第一个后端的语法并不方便,并且会根据用户请求的输出而有所不同。 refprop功能是为了减轻refpropm的缺点而refpropm的努力。 值得注意的是,它允许: 使用数组作为输入; 用相同的语法计算纯流体和混合物的属性; 为了更轻松地处理实验数据,并提供不确定性选项; 用法 该函数依赖于NIST REFPROP MATLAB函数。 从逻辑上讲, refpropm必须存在于您的MATLAB PATH中并且要起作用。 有关函数语法的详细信息,请参见MATLAB帮助: help refp
2021-08-22 14:29:51 26KB MATLAB
1
国家网络空间安全教育计划
2021-08-17 22:00:24 1008KB 信息安全
1
2021 NIST《零信任架构规划》白皮书-英文版和翻译版,供大家学习和参考。
NIST-800-190 应用容器安全指南(中文版)。独自翻译了英文版,欢迎大家提出建议。应用容器技术,也称为容器,是操作系统虚拟化与应用程序软件打包结合的一种形式。容器提供了一种打包,运行应用程序的便携式,可重用和自动化方式
2021-08-11 12:06:34 1.37MB NIST 容器 安全 容器安全
1
随机数测试标准-NIST随机数测试
2021-08-09 09:00:16 1.03MB 随机数测试标准
1
软件介绍: Refprop9.0是一款开源的NIST物性查询软件,目前最新版本为9.1,此版本为9.0.可满足大所属物性查询需求,对于编写高精度特性计算程序具有一定的使用价值。能够计算出各种制冷剂的物性,而且有DLL文件供VB和Matlab调用,使用及其方便。
2021-08-09 08:13:38 3.5MB 其他资源
1
NIST官方出品的语音识别评分工具,在http://www.openslr.org/4/可以下载到,但是中国可能有的人进不去这个网站,所以传一份到csdn,给那些需要的人下载
2021-08-06 09:37:02 1.92MB sctk NIST 语音识别 ASR
1