Jan. 28, 2011
NIST SP 800-144 provides an overview of the security and privacy challenges for public cloud computing and gives recommendations that organizations should consider when outsourcing data, applications, and infrastructure to a public cloud environment.
NIST SP 800-145 restates the existing NIST cloud computing definition as a formal NIST publication.
DRAFT link
Information about mobile telecommunications security in LTE, UMTS, GSM technology.
Saturday, 29 January 2011
Cryptographic Algorithms and Key Sizes for Personal Identification Verification
January 5, 2011
NIST announces that Special Publication 800-78-3, Cryptographic Algorithms and Key Sizes for Personal Identity Verification, has been released. The document has been modified 1) to align the set of acceptable RSA public key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances
link
NIST announces that Special Publication 800-78-3, Cryptographic Algorithms and Key Sizes for Personal Identity Verification, has been released. The document has been modified 1) to align the set of acceptable RSA public key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances
link
Transitions Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths - NIST 800-131A
January 13, 2011
NIST announces the completion of Special Publication (SP) 800-131A, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. This Recommendation provides the approach for transitioning from the use of one algorithm or key length to another, as initially addressed in Part 1 of SP 800-57.
Special Publication (SP) 800-131A link
NIST announces the completion of Special Publication (SP) 800-131A, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. This Recommendation provides the approach for transitioning from the use of one algorithm or key length to another, as initially addressed in Part 1 of SP 800-57.
Special Publication (SP) 800-131A link
Sunday, 23 January 2011
Subscribe to:
Posts (Atom)