Cryptographic mechanisms are often used to protect the integrity and confidentiality of data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. A cryptographic mechanism relies upon two basic components: an algorithm (or cryptographic methodology) and a variable cryptographic key. The algorithm and key are used together to apply cryptographic protection to data (e.g., to encrypt the data or to generate a digital signature) and to remove or check the protection (e.g., to decrypt the encrypted data or to verify a digital signature). This is analogous to a physical safe that can be opened only with the correct combination. Two types of cryptographic algorithms are in common use today: symmetric key algorithms and asymmetric key algorithms. Symmetric key algorithms (sometimes called secret key algorithms) use a single key to both apply cryptographic protection and to remove or check the protection. Asymmetric key algorithms (often called public key algorithms) use a pair of keys (i.e., a key pair): a public key and a private key that are mathematically related to each other. In the case of symmetric key algorithms, the single key must be kept secret from everyone and everything not specifically authorized to access the information being protected. In asymmetric key cryptography, only one key in the key pair, the private key, must be kept secret; the other key can be made public. Symmetric key cryptography is most often used to protect the confidentiality of information or to authenticate the integrity of that information. Asymmetric key cryptography is commonly used to protect the integrity and authenticity of information and to establish symmetric keys. Given differences in the nature of symmetric and asymmetric key cryptography and of the requirements of different security applications of cryptography, specific key management requirements and methods necessarily vary from application to application. Regardless of the algorithm or application, if cryptography is to deliver confidentiality, integrity, or authenticity, users and systems need to have assurance that the key is authentic, that it belongs to the entity with whom or which it is asserted to be associated, and that it has not been accessed by an unauthorized third party. SP 800-57, Recommendation for Key Management (hereafter referred to as SP 800-57 or the Recommendation), provides guidelines and best practices for achieving this necessary assurance. SP 800-57 consists of three parts. This publication is Part 2 of the Recommendation (i.e., SP 800-57 Part 2 – Best Practices for Key Management Organizations) and is intended primarily to address the needs of U.S. government system owners and managers who are setting up or acquiring cryptographic key management capabilities. Parts 1 and 3 of SP 800-57 focus on cryptographic key management mechanisms. SP 800-57 Part 1, General, (hereafter referred to as Part 1) contains basic key management guidance intended to advise users, developers and system managers; and SP 800-57 Part 3, Application-Specific Key Management Guidance, (hereafter referred to as Part 3) is intended to address specific key management issues associated with currently available implementations. SP 800-57 has been developed by and for the U.S. Federal Government. Non-governmental organizations may voluntarily choose to follow the practices provided herein.
2025-06-05 14:37:46 1.14MB NIST SP800
1
寻找最小数的matlab代码自述文件,2018年7月30日。 版权所有Crypto4A Technologies Inc.2018 介绍 该目录包含一组Matlab函数,以帮助表征NIST SP800-90B(2018年1月)中介绍的噪声源的熵。 SP800-90B文档中描述的每个IID测试,包括附加的卡方函数和每个最小熵估计,都已在Matlab中实现,并使用二进制数据进行了测试。 此外,还提供了一种快速(尽管不够精确)的测试来确定数据集是否为IID。 读者可以参考NIST的SP800-90B文档(),以获得有关此存储库中实施的统计测试的更多详细信息。 请注意,本文档中“ xyz部分”的每次使用均指代SP800-90B中相同名称的部分。 有关如何使用这些工具的指针: 获得Matlab和工具集的“测试过”版本(其他版本尚未经过测试): Matlab 2018a,distrib_computing_toolbox和statistics_toolbox。 如果要使用功能read_bin_files和independance_test_binary ,则还需要通讯系统工具箱具有bi2de和de
2025-04-10 22:19:55 97KB 系统开源
1
下载前必读!!!!!! 1.此代码是matlab代码,用的实例是Lorenz系统 2.此代码是图片格式,需要读者自行敲打键盘 3.若你们不想手敲键盘,我可代敲,具体私聊 其他说明: SP800-22测试是NIST发布的一项特殊出版物,目的是评估随机数生成器的质量和随机性。这些测试方法可以用于各种各样的随机性检测场景,并且是各种安全标准和规范的基础。 SP800-22测试提供了一系列统计测试和随机性分析,用于检查生成的随机数序列是否具有良好的统计特性和随机性。其中包括频次测试、卡方测试、最长序列测试、游程测试、秩测试等。
2024-05-27 11:13:15 2.79MB matlab
1
NIST SP800-26 中文翻译版,IT系统安全自评估NIST SP800系列,行业参考资料,中文翻译版
2023-11-08 11:50:30 1.09MB NIST 工控安全 网络安全 系统安全
1
This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC are modes of operation for an underlying approved symmetric key block cipher. KEY WORDS: authenticated encryption; authentication; block cipher; confidentiality, cryptography; encryption; information security; mode of operation.
2023-09-04 15:27:00 1.16MB NIST SP800
1
NIST SP800-53 中文翻译
2023-01-02 14:00:26 5.53MB NIST
1
NIST 系列 风险控制 pdf 800-37
2022-07-11 19:00:15 1.52MB NIST
1
随机数熵评估标准 NIST.SP800-90B 源代码。 近似熵 最小熵
2022-06-10 16:05:15 2.07MB 随机数熵评估标准
供应链网络安全风险管理最佳实践
2022-05-11 21:00:08 4.4MB 供应链安全 NIST SP800 网络安全
信息安全 NIST SP 800 信息技术安全基础技术模型
2022-03-17 10:00:24 270KB 信息安全 NIST SP 800-33
1