Tuesday, February 5, 2013

PHONE OPTIONS

https://play.google.com/store/apps/details?id=com.jim2

 redpoint73 (ACE - Wizard)May 16Does Widgetsoid actually properly turn off LTE?  Most toggle widgets don't work to turn off LTE on recent AT&T's phones.  AT&T locks out the feature on purpose, which is annoying. In reading about the HTC Vivid, which had the same issue, users successfully shutoff LTE by changing the data connection APN.  AT&T uses a different APN for LTE than non-LTE users, so it makes perfect sense.  Force it to the non-LTE APN, and it won't be able to connect to LTE.  I've been testing this out, and it seems to work.  I used the APN values from my old phone.  When I switch to that APN, the "4G LTE" icon goes away, and is replaced by the "4G" icon (remember that AT&T calls their HSPA+ network 4G).  Switch the APN back to the original "shipped" APN (called AT&T PTA), and the LTE icon comes back.  To do this, go to Settings>Mobile Network>Access Point Names Click the Menu button, and select "New APN" Enter the following: Name:  Media Net     (name doesn't really matter, as long as its different from the original APN)APN:  wap.cingularProxy:  Not setPort:  Not setUsername:  WAP@CINGULAR.COMPassword:  Not setServer:  Not setMMSC:  http://mmsc.cingular.comMMS proxy:  wireless.cingular.comMMS Port:  80MMS Protocol:  WAP 2.0MCC:  310MNC:  410Authentication type:  Not setAPN type:  default,supl,mms     (no spaces after each comma)Bearer:  Unspecified After entering the values, hit Menu again, and select "Save".  Now go back, and you should see your "new" APN listed along with the "original" one (should be AT&T PTA).  Just select the new APN, and hit back or home.  You will see the 4G LTE icon disappear, and you will lose data for a minute or so (if you use the browser, it will give a no connection error).  Then you should see the "4G" icon come up (no LTE), and you should have your data connection back. Like I said, I'm still testing this out.  Try it out, and let me know if it works for you.  You should probably try sending and receiving MMS, just to make sure those work (I tested by sending a photo to myself, and seems to work fine). The wrong APN info can sometimes mess up MMS, but if that works, and other data works, you should be good to go. I'm in a LTE market, and LTE is actually one of the reasons I bought this phone.  So I actually intend to keep LTE on for the most part.  But it would be nice to be able to shut if off if in a fringe LTE reception area, which may kill the battery quickly and/or cause connection problems.  Or possibly save some battery if in a non-LTE market

Ref. Galaxy Note Tips & Tricks, How to, Turn off 4G on galaxy Note,Dsiable 4G/LTE on ATT Galaxy NoteSome AT & T Galaxy Note owners said that the 4G connection drains the battery very fast,especially when you are in a area where 4G networks is weak or not supported. You may want to disable the 4G/LTE networking or switch it to 2G/3G mode.how to disable 4G / LTE on galaxy Note:Go Settings > Wireless and network > Mobile networks > uncheck Use packet data.This would disable the data connection entirely on your Galaxy Note.also, you can install a 3rd party Apps named as "Widgetsoid2.x" [download it from android market]Step 1, Download and install the Widgetsoid2.xStep 2, From Home Screen, Settings–> Add widget —> Widgetsoid –Network.Step 3, Toggle 2g/3g, and "Apply"this Widgetsoid would add 2G/3G (Shortcut to mobile settings) on your main screen.Try this, wish this helps you! and you may find other amazing features with this Widgetsoid2.x


On the Android, turn off Wifi and then go to Settings > Wireless & Networks > Mobile Networks > Access Point NamesNow you need to delete all the existing APNs. Tap on an existing APN. Then press the menu button, and click "Delete APN". Repeat until there are no more APNs listed. If for some reason the existing APNs are locked and your unable to delete them, download APN Backup & Restore from the Android Market and use that to delete them.https://market.android.com/details?id=com.riteshsahu.APNBackupRestorePress the menu button on the phone and choose "New APN"Fill in the APN informationName: www.traemcneely.com, AT&T, just a typical name, doesn't matter.APN: wap.cingularProxy: {leave this blank}Port: {leave this blank}User name: WAP@CINGULARGPRS.COMPassword: CINGULAR1Server: {leave this blank}MMSC: http://mmsc.cingular.comMMS proxy: wireless.cingular.comMMS port: 80MCC: 310MNC: 410Authentication type: {leav this blank}APN type: internet + mmsPress the menu button again and choose "Save"You may need to restart your phone to apply these settings. Data and MMS should work afterwards. Give it a minute to connect to the data network. If it doesn't work, verify that you entered everything exactly as is. One mistake can mean it won't work.


 messino (Visitor)7/9/11The key to a good 3G and HSDPA connection (through microcell) is having the right Access Point Name.  What doesn't work is the Access Point Name which ships with the product, whether you are using Froyo or Gingerbread.  What does work is: Name     APN BroadbandAPN        BroadbandMCC       310MNC       410All other fields left blank. or Name     AT&TAPN        broadbandMCC       310MNC       410All other fields left blank. To Set:  Applications / Settings / Wireless and network / Mobile networks / Access Point Names / submenu / New APNthen fill out form. Also set | Use packet data and Data roaming


 oceanwalker (Visitor)6/2/09Isp.cingular is only used for aircards and tethering phones. Outside of tethering all at&t phones use wap.cingular for standard internet access. While it is true you can configure your phone to use isp.cingular without the appropriate data plan beware that charges may apply sometime in the future.



Settings>Wireless and Network>Use packet data [yes]>Access Point Names>AT&T 310 410>Name: AT&T 310 410APN: wap.cingularProxy: wireless.cingular.comPort: 80Username: Not SetPassword: Not SetServer: Not SetMMSC: http://mmsc.cingular.comMMS Proxy: wireless.cingular.comMMS port: 80MCC: 310MNC: 410Authentication type: NoneAPN type: MMS


MMSC: mmsc.cingular.comPROXY: 066.209.011.032APN: wap.cingularIMAGE SIZE: maximumUSERAGENT: iphone
--

In marketplace under Nokia Collection there is a free app called Network Setup. This app is for people that travel around the world with different carrier network settings based on where they travel.Nice thing is you can Add your own custom APN settings for HSPA+. The application comes defaulted with At&t LTE settings and AT&t 3g but for what ever reasons the 3g settings don't work.Once app is downloaded open app "add apn" and use these settingsConnection name: At&t HSPA+Internet APN settings as followAccess point name: phoneYes that's it just the word phoneleave all other setting blank under Internet APNUnder MMS APNMMS access point name: phoneProxy address: proxy.mobile.att.netproxy port: 80Username: leave blankPassword: leave blankMMSC address: http://mmsc.cingular.comOnce saved then you can do a before and after internet speed test using a free app called "Bandwidth". I averaged at the time with my test 16-18mbps under LTE and consistent 8-10mbps HSPA+.Now the LTE logo will still show in the upper left corner next to the reception bars but rest assured you will be using HSPA+.Hope someone finds this useful.


http://forums.att.com/t5/AT-T-Wireless-Community/ct-p/attwireless/interaction-style/forum

http://forums.att.com/t5/Wireless-Community-Suggestions/bd-p/gen

http://forums.att.com/t5/The-Wireless-Lounge/bd-p/TheLounge


http://forums.att.com/t5/Wireless-Community-Suggestions/bd-p/gen



Communications & WirelessNumberDateTitleFIPS 140--3Dec. 11, 2009DRAFT Security Requirements for Cryptographic Modules (Revised Draft)revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.ziprevised-fips140-3_comments-template.dotFIPS 140--2May 2001Security Requirements for Cryptographic Modules(*Includes Change Notices as of December 3, 2002*)fips1402.pdffips1402annexa.pdffips1402annexb.pdffips1402annexc.pdffips1402annexd.pdfFIPS 140--1Jan 1994FIPS 140-1: Security Requirements for Cryptographic Modulesfips1401.pdfSP 800-164Oct. 31, 2012DRAFT Guidelines on Hardware-Rooted Security in Mobile Devicessp800_164_draft.pdfSP 800-153Feb. 2012Guidelines for Securing Wireless Local Area Networks (WLANs)sp800-153.pdfSP 800-127Sept. 2010Guide to Securing WiMAX Wireless Communicationssp800-127.pdfSP 800-124 Rev 1Jul 10, 2012DRAFT Guidelines for Managing and Securing Mobile Devices in the Enterprisedraft_sp800-124-rev1.pdfSP 800-124Oct 2008Guidelines on Cell Phone and PDA SecuritySP800-124.pdfSP 800-121 Rev. 1June 2012Guide to Bluetooth Securitysp800-121_rev1.pdfSP 800-120Sept. 2009Recommendation for EAP Methods Used in Wireless Network Access Authenticationsp800-120.pdfSP 800-119Dec. 2010Guidelines for the Secure Deployment of IPv6sp800-119.pdfSP 800-115Sept 2008Technical Guide to Information Security Testing and AssessmentSP800-115.pdfSP 800-114Nov 2007User's Guide to Securing External Devices for Telework and Remote AccessSP800-114.pdfSP 800-113Jul 2008Guide to SSL VPNsSP800-113.pdfSP 800-101May 2007Guidelines on Cell Phone ForensicsSP800-101.pdfSP 800-98Apr 2007Guidelines for Securing Radio Frequency Identification (RFID) SystemsSP800-98_RFID-2007.pdfSP 800-82Jun. 2011Guide to Industrial Control Systems (ICS) SecuritySP800-82-final.pdfSP 800-81 Rev. 1Apr. 2010Secure Domain Name System (DNS) Deployment Guidesp-800-81r1.pdfSP 800-77Dec 2005Guide to IPsec VPNssp800-77.pdfSP 800-58Jan 2005Security Considerations for Voice Over IP SystemsSP800-58-final.pdfSP 800-54Jul 2007Border Gateway Protocol SecuritySP800-54.pdfSP 800-53 Rev. 4Feb. 5, 2013DRAFT Security and Privacy Controls for Federal Information Systems and Organizations (Final Public Draft)sp800_53_r4_draft_fpd.pdfSP 800-53 Rev. 3Aug 2009Recommended Security Controls for Federal Information Systems and Organizations(*Includes Updates as of May 1, 2010*)sp800-53-rev3-final_updated-errata_05-01-2010.pdfsp-800-53-rev3_database-beta.html800-53-rev3_markup-final-public-draft-to-final-updated_may-01-2010.pdf800-53-rev3_markup-rev2-to-rev3_updated-may-01-2010.pdf800-53-rev3-Annex1_updated_may-01-2010.pdf800-53-rev3-Annex2_updated_may-01-2010.pdf800-53-rev3-Annex3_updated_may-01-2010.pdfSP_800-53_Rev-3_database-R1.4.1-BETA.zipSP 800-52Jun 2005Guidelines for the Selection and Use of Transport Layer Security (TLS) ImplementationsSP800-52.pdfSP 800-48 Rev. 1Jul 2008Guide to Securing Legacy IEEE 802.11 Wireless NetworksSP800-48r1.pdfSP 800-46 Rev. 1Jun. 2009Guide to Enterprise Telework and Remote Access Securitysp800-46r1.pdfSP 800-45 Version 2Feb 2007Guidelines on Electronic Mail SecuritySP800-45v2.pdfSP 800-41 Rev. 1Sept. 2009Guidelines on Firewalls and Firewall Policysp800-41-rev1.pdfSP 800-24Apr 2001PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Doessp800-24pbx.pdfNIST IR 7617Oct. 2009Mobile Forensic Reference Materials: A Methodology and Reificationnistir-7617.pdfNIST IR 7452Nov 2007Secure Biometric Match-on-Card Feasibility ReportNISTIR-7452.pdfNIST IR 7387Mar 2007Cell Phone Forensic Tools: An Overview and Analysis Update,nistir-7387.pdfNIST IR 7206Jul 2005Smart Cards and Mobile Device Authentication: An Overview and Implementationnist-IR-7206.pdfNIST IR 7046Aug 2003A Framework for Multi-Mode Authentication: Overview and Implementation Guidenistir-7046.pdfITL July 2007Jul 2007Border Gateway Protocol Security - ITL Security Bulletinb-July-2007.pdfITL June 2007Jun 2007Forensic Techniques for Cell Phones - ITL Security Bulletinb-June-2007.pdfITL May 2007May 2007Securing Radio Frequency Identification (RFID) Systems - ITL Security Bulletinb-May-2007.pdfITL April 2007Apr 2007Securing Wireless Networks - ITL Security Bulletinb-April-07.pdfITL March 2007Mar 2007Improving The Security Of Electronic Mail: Updated Guidelines Issued By NIST - ITL Security Bulletinb-03-07.pdfITL June 2006Jun 2006Domain Name System (DNS) Services: NIST Recommendations For Secure Deployment - ITL Security Bulletinb-06-06.pdfITL April 2006Apr 2006Protecting Sensitive Information Transmitted in Public Networks - ITL Security Bulletinb-04-06.pdfITL October 2004Oct 2004Securing Voice Over Internet Protocol (IP) Networks - ITL Security BulletinOct-2004.pdfITL March 2003Mar 2003Security For Wireless Networks And Devices - ITL Security Bulletinmarch-03.pdfITL January 2003Jan 2003Security Of Electronic Mail - ITL Security Bulletin01-03.pdfITL November 2002Nov 2002Security For Telecommuting And Broadband Communication - ITL Security Bulletinitl11-02.pdfITL January 2002Jan 2002Guidelines on Firewalls and Firewall Policy - ITL Security Bulletin01-02.pdfITL March 2001Mar 2001An Introduction to IPsec (Internet Protocol Security) - ITL Security Bulletin03-01.pdfITL August 2000Aug 2000Security for Private Branch Exchange Systems - ITL Security Bulletin08-00.pdfBack to TopContingency PlanningNumberDateTitleSP 800-147 BJuly 30, 2012DRAFT BIOS Protection Guidelines for Serversdraft-sp800-147b_july2012.pdfSP 800-147Apr. 2011Basic Input/Output System (BIOS) Protection GuidelinesNIST-SP800-147-April2011.pdfSP 800-84Sep 2006Guide to Test, Training, and Exercise Programs for IT Plans and CapabilitiesSP800-84.pdfSP 800-53 Rev. 4Feb. 5, 2013DRAFT Security and Privacy Controls for Federal Information Systems and Organizations (Final Public Draft)sp800_53_r4_draft_fpd.pdfSP 800-53 Rev. 3Aug 2009Recommended Security Controls for Federal Information Systems and Organizations(*Includes Updates as of May 1, 2010*)sp800-53-rev3-final_updated-errata_05-01-2010.pdfsp-800-53-rev3_database-beta.html800-53-rev3_markup-final-public-draft-to-final-updated_may-01-2010.pdf800-53-rev3_markup-rev2-to-rev3_updated-may-01-2010.pdf800-53-rev3-Annex1_updated_may-01-2010.pdf800-53-rev3-Annex2_updated_may-01-2010.pdf800-53-rev3-Annex3_updated_may-01-2010.pdfSP_800-53_Rev-3_database-R1.4.1-BETA.zipSP 800-46 Rev. 1Jun. 2009Guide to Enterprise Telework and Remote Access Securitysp800-46r1.pdfSP 800-34 Rev. 1May 2010Contingency Planning Guide for Federal Information Systems (Errata Page - Nov. 11, 2010)sp800-34-rev1_errata-Nov11-2010.pdfITL December 2006Dec 2006Maintaining Effective Information Technology (IT) Security Through Test, Training, And Exercise Programs - ITL Security Bulletinb-12-06.pdfITL January 2004Jan 2004Computer Security Incidents: Assessing, Managing, And Controlling The Risks - ITL Security Bulletinb-01-04.pdfITL June 2002Jun 2002Contingency Planning Guide For Information Technology Systems - ITL Security Bulletinbulletin06-02.pdfITL April 2002Apr 2002Techniques for System and Data Recovery - ITL Security Bulletin04-02.pdfBack to TopCryptographyNumberDateTitleFIPS 198--1Jul 2008The Keyed-Hash Message Authentication Code (HMAC)FIPS-198-1_final.pdfFIPS 197Nov 2001Advanced Encryption Standardfips-197.pdfFIPS 196Feb 1997Entity Authentication Using Public Key Cryptographyfips196.pdfFIPS 190Sep 1994Guideline for the Use of Advanced Authentication Technology Alternativesfip190.txtFIPS 186--3Jun. 2009Digital Signature Standard (DSS)fips_186-3.pdfFIPS 185Feb 1994Escrowed Encryption Standardfips185.txtFIPS 181Oct 1993Automated Password Generatorfips181.txtFIPS 180--4March 2012Secure Hash Standard (SHS)fips-180-4.pdfFIPS 140--3Dec. 11, 2009DRAFT Security Requirements for Cryptographic Modules (Revised Draft)revised-draft-fips140-3_PDF-zip_document-annexA-to-annexG.ziprevised-fips140-3_comments-template.dotFIPS 140--2May 2001Security Requirements for Cryptographic Modules(*Includes Change Notices as of December 3, 2002*)fips1402.pdffips1402annexa.pdffips1402annexb.pdffips1402annexc.pdffips1402annexd.pdfFIPS 140--1Jan 1994FIPS 140-1: Security Requirements for Cryptographic Modulesfips1401.pdfFIPS 113May 1985Computer Data Authentication (no electronic version available)ordering-pubs.htmlSP 800-152August 8, 2012DRAFT A Profile for U. S. Federal Cryptographic Key Management Systems (CKMS)draft-sp-800-152.pdfSP 800-147 BJuly 30, 2012DRAFT BIOS Protection Guidelines for Serversdraft-sp800-147b_july2012.pdfSP 800-147Apr. 2011Basic Input/Output System (BIOS) Protection GuidelinesNIST-SP800-147-April2011.pdfSP 800-135 Rev. 1Dec. 2011Recommendation for Existing Application-Specific Key Derivation Functionssp800-135-rev1.pdfSP 800-133Dec. 2012Recommendation for Cryptographic Key Generationdx.doi.org/10.6028/NIST.SP.800-133SP 800-132Dec. 2010Recommendation for Password-Based Key Derivation Part 1: Storage Applicationsnist-sp800-132.pdfSP 800-131 AJan. 2011Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengthssp800-131A.pdfSP 800-130Apr. 13, 2012DRAFT A Framework for Designing Cryptographic Key Management Systemssecond-draft_sp-800-130_april-2012.pdfSP 800-127Sept. 2010Guide to Securing WiMAX Wireless Communicationssp800-127.pdfSP 800-120Sept. 2009Recommendation for EAP Methods Used in Wireless Network Access Authenticationsp800-120.pdfSP 800-118Apr. 21, 2009DRAFT Guide to Enterprise Password Managementdraft-sp800-118.pdfSP 800-116Nov 2008A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)SP800-116.pdfSP 800-113Jul 2008Guide to SSL VPNsSP800-113.pdfSP 800-111Nov 2007Guide to Storage Encryption Technologies for End User DevicesSP800-111.pdfSP 800-108Oct. 2009Recommendation for Key Derivation Using Pseudorandom Functionssp800-108.pdfSP 800-107 Rev. 1Aug. 2012Recommendation for Applications Using Approved Hash Algorithmssp800-107-rev1.pdfSP 800-106Feb. 2009Randomized Hashing for Digital SignaturesNIST-SP-800-106.pdfSP 800-102Sept. 2009Recommendation for Digital Signature Timelinesssp800-102.pdfSP 800-90 CSept. 5, 2012DRAFT Recommendation for Random Bit Generator (RBG) Constructionsdraft-sp800-90c.pdfSP 800-90 BSept. 5, 2012DRAFT Recommendation for the Entropy Sources Used for Random Bit Generationdraft-sp800-90b.pdfquestions-about_draft-sp800-90b.pdfSP 800-90 AJan. 2012Recommendation for Random Number Generation Using Deterministic Random Bit GeneratorsSP800-90A.pdfSP 800-78 -3Dec. 2010Cryptographic Algorithms and Key Sizes for Personal Identification Verification (PIV)sp800-78-3.pdfSP 800-73 -3Feb. 2010Interfaces for Personal Identity Verification (4 Parts)Pt. 1- End Point PIV Card Application Namespace, Data Model & RepresentationPt. 2- PIV Card Application Card Command InterfacePt. 3- PIV Client Application Programming InterfacePt. 4- The PIV Transitional Interfaces & Data Model Specificationsp800-73-3_PART1_piv-card-applic-namespace-date-model-rep.pdfsp800-73-3_PART2_piv-card-applic-card-common-interface.pdfsp800-73-3_PART3_piv-client-applic-programming-interface.pdfsp800-73-3_PART4_piv-transitional-interface-data-model-spec.pdfSP 800-67 Rev. 1Jan. 2012Recommendation for the Triple Data Encryption Algorithm (TDEA) Block CipherSP-800-67-Rev1.pdfSP 800-63 -1Dec. 2011Electronic Authentication GuidelineSP-800-63-1.pdfSP 800-57 Part 1Jul 2012Recommendation for Key Management: Part 1: General (Revision 3)sp800-57_part1_rev3_general.pdfSP 800-57 Part 2Aug 2005Recommendation for Key Management: Part 2: Best Practices for Key Management OrganizationSP800-57-Part2.pdfSP 800-57 Part 3Dec 2009Recommendation for Key Management, Part 3 Application-Specific Key Management Guidancesp800-57_PART3_key-management_Dec2009.pdfSP 800-56 CNov. 2011Recommendation for Key Derivation through Extraction-then-ExpansionSP-800-56C.pdfSP 800-56 BAug. 2009Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptographysp800-56B.pdfSP 800-56 AMar 2007Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm CryptographySP800-56A_Revision1_Mar08-2007.pdfSP 800-56 A RevAug 20, 2012DRAFT Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography (Draft Revision)draft-sp-800-56a.pdfSP 800-53 Rev. 4Feb. 5, 2013DRAFT Security and Privacy Controls for Federal Information Systems and Organizations (Final Public Draft)sp800_53_r4_draft_fpd.pdfSP 800-53 Rev. 3Aug 2009Recommended Security Controls for Federal Information Systems and Organizations(*Includes Updates as of May 1, 2010*)sp800-53-rev3-final_updated-errata_05-01-2010.pdfsp-800-53-rev3_database-beta.html800-53-rev3_markup-final-public-draft-to-final-updated_may-01-2010.pdf800-53-rev3_markup-rev2-to-rev3_updated-may-01-2010.pdf800-53-rev3-Annex1_updated_may-01-2010.pdf800-53-rev3-Annex2_updated_may-01-2010.pdf800-53-rev3-Annex3_updated_may-01-2010.pdfSP_800-53_Rev-3_database-R1.4.1-BETA.zipSP 800-52Jun 2005Guidelines for the Selection and Use of Transport Layer Security (TLS) ImplementationsSP800-52.pdfSP 800-49Nov 2002Federal S/MIME V3 Client Profilesp800-49.pdfSP 800-38 FDec. 2012Recommendation for Block Cipher Modes of Operation: Methods for Key Wrappingdx.doi.org/10.6028/NIST.SP.800-38FSP 800-38 ADec 2001Recommendation for Block Cipher Modes of Operation - Methods and Techniquessp800-38a.pdfSP 800-38 A - AddendumOct. 2010Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Modeaddendum-to-nist_sp800-38A.pdfSP 800-38 BMay 2005Recommendation for Block Cipher Modes of Operation: The CMAC Mode for AuthenticationSP_800-38B.pdfUpdated_CMAC_Examples.pdfSP 800-38 CMay 2004Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and ConfidentialitySP800-38C_updated-July20_2007.pdfSP 800-38 DNov 2007Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMACSP-800-38D.pdfSP 800-38 EJan. 2010Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devicesnist-sp-800-38E.pdfSP 800-32Feb 2001Introduction to Public Key Technology and the Federal PKI Infrastructuresp800-32.pdfSP 800-25Oct 2000Federal Agency Use of Public Key Technology for Digital Signatures and Authenticationsp800-25.pdfSP 800-22 Rev. 1aApr. 2010A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic ApplicationsSP800-22rev1a.pdfSP 800-21 2nd editionDec 2005Guideline for Implementing Cryptography in the Federal Governmentsp800-21-1_Dec2005.pdfSP 800-17Feb 1998Modes of Operation Validation System (MOVS): Requirements and Procedures800-17.pdfSP 800-15 Version 1Jan 1998MISPC Minimum Interoperability Specification for PKI ComponentsSP800-15.PDFNIST IR 7896Nov. 2012Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competitiondx.doi.org/10.6028/NIST.IR.7896NIST IR 7817Nov. 2012A Credential Reliability and Revocation Model for Federated Identitiesdx.doi.org/10.6028/NIST.IR.7817NIST IR 7802Sept. 2011Trust Model for Security Automation Data (TMSAD) Version 1.0NISTIR-7802.pdfNIST IR 7764Feb. 2011Status Report on the Second Round of the SHA-3 Cryptographic Hash Algorithm Competitionnistir-7764.pdfNIST IR 7676June 2010Maintaining and Using Key History on Personal Identity Verification (PIV) Cardsnistir-7676.pdfNIST IR 7620Sept. 2009Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competitionnistir_7620.pdfNIST IR 7611Aug. 2009Use of ISO/IEC 24727 -- Service Access Layer Interface for Identity (SALII): Support for Development and use of Interoperable Identity Credentialsnistir7611_use-of-isoiec24727.pdfNIST IR 7609Jan. 2010Cryptographic Key Management Workshop Summarynistir-7609.pdfNIST IR 7452Nov 2007Secure Biometric Match-on-Card Feasibility ReportNISTIR-7452.pdfNIST IR 7206Jul 2005Smart Cards and Mobile Device Authentication: An Overview and Implementationnist-IR-7206.pdfNIST IR 7046Aug 2003A Framework for Multi-Mode Authentication: Overview and Implementation Guidenistir-7046.pdfITL December 2012Dec. 2012Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Informationitlbul2012_12.pdfITL May 2006May 2006An Update On Cryptographic Standards, Guidelines, And Testing Requirements - ITL Security Bulletinb-05-06.pdfITL September 2002Sep 2002Cryptographic Standards and Guidelines: A Status Report - ITL Security Bulletin09-02itl.pdfITL December 2000Dec 2000A Statistical Test Suite For Random And Pseudorandom Number Generators For Cryptographic Applications - ITL Security Bulletin12-00.pdfITL February 2000Feb 2000Guideline for Implementing Cryptography in the Federal Government - ITL Security Bulletin02-00.pdf

No comments:

Post a Comment