1-8 of 8 results returned for: "keywords:"Commercial National Security Algorithm Suite - CNSA Suite""
WPA3 will Enhance Wi-Fi Security
On January 8th 2018, the Wi-Fi alliance announced new enhancements to Wi-Fi Protected Access II (WPA2) security specification and a new WPA3 security specification. Enhancements to WPA2 will include improvements in authentication, encryption, and configuration requirements. WPA3 will build on...
10 July 2018 8 page(s) pdf
Suite B Implementer’s Guide to FIPS 186-3 (ECDSA)
This document specifies the Elliptic Curve Digital Signature Algorithm (ECDSA) from the "Digital Signature Standard" [FIPS186-3] that will be used in future and existing cryptographic protocols for Suite B products. It also includes the Suite B elliptic curve domain parameters,...
03 February 2010 35 page(s) pdf
CNSA Suite and Quantum Computing FAQ
This document provides answers to commonly asked questions regarding the Commercial National Security Algorithm (CNSA) Suite, Quantum Computing and CNSS Advisory Memorandum 02-15.
05 January 2016 11 page(s) pdf
Commercial National Security Algorithm (CNSA) Suite Factsheet
Rapid and secure information sharing is important to protect our Nation, its citizens and its interests. Strong cryptographic algorithms are vital tools that contribute to our national security and help address the need for secure, interoperable communications. This document highlights...
30 December 2015 2 page(s) pdf
Cryptographic algorithms are specified by the National Institute of Standards and Technology (NIST) and are used by NSA's Information Assurance Directorate (IAD) in solutions approved for protecting National Security Systems (NSS). They include cryptographic algorithms for encryption, key exchange, digital...
15 May 2015
Commercial National Security Algorithm Suite
The Commercial National Security Algorithm Suite (CNSA Suite) will provide new algorithms for those customers who are looking for mitigations to perform, replacing the current Suite B algorithms.
16 December 2015
Mathematical routines for the NIST prime elliptic curves
Described in this document are routines for implementing primitives for elliptic curve cryptography on the NIST elliptic curves P–192, P–224, P–256, P–384, and P–521 given in [FIPS186-2]. Also included are specialized routines for field arithmetic over the relevant prime fields...
05 April 2010 44 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015