A key-encapsulation mechanism (KEM) is a set of algorithms that, under certain conditions, can be used by two parties to establish a shared secret key over a public channel. A shared secret key that is securely established using a KEM can then be used with symmetric-key cryptographic algorithms to perform basic tasks in secure communications, such as encryption and authentication. This standard specifies a key-encapsulation mechanism called ML-KEM. The security of ML-KEM is related to the com...| csrc.nist.gov
Recommendation for Key Derivation Using Pseudorandom Functions| NIST
US President Joe Biden looks at a quantum computer as he tours the IBM facility in Poughkeepsie, New York, on October 6, 2022. (Photo by MANDEL NGAN/AFP via Getty Images). | FedScoop
US President Joe Biden looks at a quantum computer as he tours the IBM facility in Poughkeepsie, New York, on October 6, 2022. (Photo by MANDEL NGAN/AFP via Getty Images). | FedScoop
NIST Director Laurie Locascio testifies during a House Science, Space and Technology Committee hearing on May 22, 2024, in Washington, D.C. | FedScoop
The General Services Administration headquarters in April 2012. (Photo credit should read MANDEL NGAN/AFP via Getty Images) | FedScoop
Britain’s Science, Innovation and Technology Secretary Michelle Donelan (R) greets U.S. Commerce Secretary Gina Raimondo during the U.K. Artificial Intelligence (AI) Safety Summit at Bletchley Park, in central England, on Nov. 1, 2023. (Photo by JUSTIN TALLIS/AFP via Getty Images) | FedScoop
(Wikimedia Commons) | FedScoop
The Daily Scoop Podcast | FedScoop
NIST Director Laurie Locascio testifies during a House Science, Space and Technology Committee hearing on May 22, 2024, in Washington, D.C. | FedScoop
Federal agency reveals the first group of winners from its six-year competition.| NIST
The terms digital signature and electronic signature are sometimes confused or used interchangeably. While digital signatures are a form of electronic signature, not all electronic signatures are digital signatures.| Cybersecurity and Infrastructure Security Agency CISA