NIST-approved cryptographic standards were designed to
perform well using general-purpose computers. In recent years, there has been
increased deployment of small computing devices that have limited resources
with which to implement cryptography. When current NIST-approved algorithms can
be engineered to fit into the limited resources of constrained environments,
their performance may not be acceptable. For these reasons, NIST started a
lightweight cryptography project that was tasked with learning more about the
issues and developing a strategy for the standardization of lightweight
cryptographic algorithms. This report provides an overview of the lightweight
cryptography project at NIST, and describes plans for the standardization of
lightweight cryptographic algorithms.
In the
employment of contact fingerprint collection technology, many risks are
involved in the use of these systems, such as the transmission of pathogens by
the contaminated contact surface of the scanner as well as increased collection
times resulting in slower throughput in the overall process. Touchless systems
address these concerns but also introduce new challenges related to human
factors that may affect the biometric system performance. To examine these
issues, it is necessary to study the usability of the contactless
fingerprinting devices in terms of: ergonomics and anthropometrics, affordance,
accessibility, and user satisfaction.
This report documents the
Face in Video Evaluation (FIVE), an independent, public test of face
recognition of non-cooperating subjects who are recorded passively and are
mostly oblivious to the presence of cameras. The report enumerates accuracy and
speed of face recognition algorithms applied to the identification of persons
appearing in video sequences drawn from six different video datasets mostly
sequestered at NIST.
This report summarizes recent technical work of the Applied
and Computational Sciences Division of the Information Technology Laboratory at
the National Institute of Standards and Technology (NIST). Part I (Overview)
provides a high-level overview of the Division’s activities, including highlights of
technical accomplishments during the previous year. Part II (Features) provides
further details on three projects of particular note this year. This is
followed in Part III (Project Summaries) by brief synopses of all technical
projects active during the past year. Part IV (Activity Data) provides listings
of publications, technical talks, and other professional activities in which
Division staff members have participated. The reporting period covered by this
document is October 2015 through December 2016.
|