Elaine B. Barker
National Institute of Standards and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Elaine B. Barker.
Journal of Research of the National Institute of Standards and Technology | 2001
James R. Nechvatal; Elaine B. Barker; Lawrence E. Bassham; William E. Burr; Morris J. Dworkin; James Foti; Edward Roback
In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST’s statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the cryptographic research community in analyzing the candidates. This analysis included an initial examination of the security and efficiency characteristics for each algorithm. NIST reviewed the results of this preliminary research and selected MARS, RC™, Rijndael, Serpent and Twofish as finalists. Having reviewed further public analysis of the finalists, NIST has decided to propose Rijndael as the Advanced Encryption Standard (AES). The research results and rationale for this selection are documented in this report.
Special Publication (NIST SP) - 800-90A Rev 1 | 2007
Elaine B. Barker; John Kelsey
This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions, block cipher algorithms or number theoretic problems.
Journal of Research of the National Institute of Standards and Technology | 1999
James R. Nechvatal; Elaine B. Barker; Donna F. Dodson; Morris J. Dworkin; James Foti; Edward Roback
In 1997, the National Institute of Standards and Technology (NIST) initiated a process to select a symmetric-key encryption algorithm to be used to protect sensitive (unclassified) Federal information in furtherance of NIST’s statutory responsibilities. In 1998, NIST announced the acceptance of 15 candidate algorithms and requested the assistance of the cryptographic research community in analyzing the candidates. This analysis included an initial examination of the security and efficiency characteristics for each algorithm. NIST has reviewed the results of this research and selected five algorithms (MARS, RC6™, Rijndael, Serpent and Twofish) as finalists. The research results and rationale for the selection of the finalists are documented in this report. The five finalists will be the subject of further study before the selection of one or more of these algorithms for inclusion in the Advanced Encryption Standard.
Special Publication (NIST SP) - 800-130 | 2013
Elaine B. Barker; Miles E. Smid; Dennis K. Branstad; Santosh Chokhani
This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that need to be addressed by the design specification. Thus, any CKMS that addresses each of these requirements would have a design specification that is compliant with this Framework.
Special Publication (NIST SP) - 800-57 Pt3 Rev 1 | 2015
Elaine B. Barker; Quynh H. Dang
NIST Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
Special Publication (NIST SP) - 800-57 Pt2 | 2014
Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid
Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
Special Publication (NIST SP) - 800-22 Rev 1a | 2000
Andrew L. Rukhin; Juan Soto; James R. Nechvatal; Miles E. Smid; Elaine B. Barker
Special Publication (NIST SP) - 800-57 Pt1 | 2005
Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid
Federal Inf. Process. Stds. (NIST FIPS) - 198-1 | 2002
Elaine B. Barker; Quynh H. Dang
Special Publication (NIST SP) - 800-56Ar3 | 2007
Elaine B. Barker; Lidong Chen; Allen L. Roginsky; Apostol T. Vassilev; Richard Davis