Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Miles E. Smid is active.

Publication


Featured researches published by Miles E. Smid.


Proceedings of the IEEE | 1988

Data Encryption Standard: past and future

Miles E. Smid; Dennis K. Branstad

The authors examine the past and future of the Data Encryption Standard (DES), which is the first, and to the present date, only, publicly available cryptographic algorithm that has been endorsed by the US government of the standard during the early 1970s, the controversy regarding the proposed standard during the mid-1970s, the growing acceptance and use of the standard in the 1980s, and some recent developments that could affect its future. >


Special Publication (NIST SP) - 800-130 | 2013

A Framework for Designing Cryptographic Key Management Systems

Elaine B. Barker; Miles E. Smid; Dennis K. Branstad; Santosh Chokhani

This Framework for Designing Cryptographic Key Management Systems (CKMS) contains topics that should be considered by a CKMS designer when developing a CKMS design specification. For each topic, there are one or more documentation requirements that need to be addressed by the design specification. Thus, any CKMS that addresses each of these requirements would have a design specification that is compliant with this Framework.


international cryptology conference | 1992

Response to Comments of the NIST Proposed Digital Signature Standard

Miles E. Smid; Dennis K. Branstad

NIST received comments from 109 separate government agencies, companies, and private individuals concerning the proposed Digital Signature Standard. Both positive and negative comments were received. However the number of negative comments was significantly larger than normally received for a proposed Federal Information Processing Standard (FTPS). This paper summarizes the major comments, both positive and negative, and provides responses where appropriate. The paper highlights the anticipated significant modifications to the proposed standard and concludes by discussing the future milestones that need to be accomplished before the proposed DSS becomes a FTPS.


IEEE Transactions on Communications | 1981

Integrating the Data Encryption Standard into Computer Networks

Miles E. Smid

The NBS Data Encryption Standard may be integrated into computer networks to protect personal (nonshared) files, to communicate securely both on- and off-line with local and remote users, to protect against key substitution, to authenticate system users, to authenticate data, and to provide digital signatures using a nonpublic key encryption algorithm. Key notarization facilities give users the capability of exercising a set of commands for key management as well as for data encryption functions. The facilities perform notarization which, upon encryption, seals a key or password with the identities of the transmitter and intended receiver. Thus, in order to decrypt a message, the receiver must authenticate himself and supply the correct identity of the transmitter. This feature eliminates the threat of key substitution which must be protected against to attain a high level of security.


Special Publication (NIST SP) - 800-57 Pt2 | 2014

Recommendation for Key Management - Part 2: Best Practices for Key Management Organization

Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid

Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.


Computers & Security | 1982

Integrity and security standards based on cryptography

Dennis K. Branstad; Miles E. Smid

Abstract Since the Data Encryption Standard (DES) was published in January, 1977, as a Federal Information Processing Standard (FIPS), it has become the basis for the development of several security and integrity standards. Seven DES based security standards have already been approved, and several others are in development. Five standards making organizations are now involved with DES based standards: the American Bankers Association (ABA), the American National Standards Institute (ANSI), the General Services Administration (GSA), the International Organization for Standardization (ISO), and the National Bureau of Standards (NBS). While these standards are all based on the DES, future standards may make provision for using other cryptographic algorithms. For example, public key cryptographic algorithms could offer some advantages over the traditional, secret key cryptographic algorithms in certain applications. In anticipation of this future requirement NBS has published a Solicitation for Public Key Cryptography Algorithms to be used in special application standards.


Special Publication (NIST SP) - 800-22 Rev 1a | 2000

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

Andrew L. Rukhin; Juan Soto; James R. Nechvatal; Miles E. Smid; Elaine B. Barker


Special Publication (NIST SP) - 800-57 Pt1 | 2005

Recommendation for key management, part 1 :: general (revised)

Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid


Archive | 1980

Crytographic key notarization methods and apparatus

Miles E. Smid; Dennis K. Branstad


Special Publication (NIST SP) - 800-57 Pt1 Rev 3 | 2012

Recommendation for Key Management - Part 1: General (Revision 3)

Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid

Collaboration


Dive into the Miles E. Smid's collaboration.

Top Co-Authors

Avatar

Elaine B. Barker

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Dennis K. Branstad

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

William E. Burr

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

William C. Barker

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew L. Rukhin

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

James R. Nechvatal

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar

Juan Soto

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lidong Chen

National Institute of Standards and Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge