Guide: System and Communication Protection Family
System and Communication Protection
NIST FIPS 201-1 | Personal Identity Verification for Federal Employees and Contractors |
---|---|
NIST FIPS 200 | Security Controls for Federal Information Systems |
NIST FIPS 198 | The Keyed-Hash Message Authentication Code (HMAC) |
NIST FIPS 197 | Advanced Encryption Standard |
NIST FIPS 190 | Guideline for the Use of Advanced Authentication Technology Alternatives |
NIST FIPS 186-3 | Digital Signature Standard (DSS) |
NIST FIPS 180-2 | Secure Hash Standard (SHS) |
NIST FIPS 140-2 | Security Requirements for Cryptographic Modules |
NIST SP 800-100 | Information Security Handbook for Managers |
NIST SP 800-97 | Guide to IEEE 802.11i: Robust Security Networks |
NIST SP 800-90 | Recommendation for Random Number Generation Using Deterministic Random Bit Generators |
NIST SP 800-89 | Recommendation for Obtaining Assurances for Digital Signature Applications |
NIST SP 800-83 | Guide to Malware Incident Prevention and Handling |
NIST SP 800-81 | Secure Domain Name System (DNS) Deployment Guide |
NIST SP 800-78 | Cryptographic Algorithms and Key Sizes for Personal Identity Verification |
NIST SP 800-77 | Guide to IPSec VPNs |
NIST SP 800-73 Rev 1 | Integrated Circuit Card for Personal Identification Verification |
NIST SP 800-70 | Security Configuration Checklists Program for IT Products |
NIST SP 800-68 | Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist |
NIST SP 800-67 | Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher |
NIST SP 800-66 | An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule |
NIST SP 800-58 | Security Considerations for Voice Over IP Systems |
NIST SP 800-57 | Recommendation on Key Management |
NIST SP 800-56A | Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography |
NIST SP 800-52 | Guidelines on the Selection and Use of Transport Layer Security |
NIST SP 800-49 | Federal S/MIME V3 Client Profile |
NIST SP 800-46 | Security for Telecommuting and Broadband Communications |
NIST SP 800-45 | Guidelines on Electronic Mail Security |
NIST SP 800-44 | Guidelines on Securing Public Web Servers |
NIST SP 800-41 | Guidelines on Firewalls and Firewall Policy |
NIST SP 800-38D | Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) for Confidentiality and Authentication |
NIST SP 800-38C | Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality |
NIST SP 800-38B | Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Mode |
NIST SP 800-38A | Recommendation for Block Cipher Modes of Operation - Methods and Techniques |
NIST SP 800-36 | Guide to Selecting Information Technology Security Products |
NIST SP 800-32 | Introduction to Public Key Technology and the Federal PKI Infrastructure |
NIST SP 800-29 | A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2 |
NIST SP 800-28 | Guidelines on Active Content and Mobile Code |
NIST SP 800-25 | Federal Agency Use of Public Key Technology for Digital Signatures and Authentication |
NIST SP 800-22 | A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications |
NIST SP 800-21 Rev 1 | Guideline for Implementing Cryptography in the Federal Government |
NIST SP 800-20 | Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures |
NIST SP 800-19 | Mobile Agent Security |
NIST SP 800-17 | Modes of Operation Validation System (MOVS): Requirements and Procedures |
NIST SP 800-15 | Minimum Interoperability Specification for PKI Components (MISPC), Version 1 |
NIST SP 800-14 | Generally Accepted Principles and Practices for Securing Information Technology Systems |
NIST SP 800-12 | An Introduction to Computer Security: The NIST Handbook |
Original source for tables: Guide to NIST Security Documents.