Applied and
Computational Mathematics Division Summary of Activities for Fiscal Year 2017
(NISTIR 8208) This report summarizes recent technical work of the
Applied and Computational Sciences Division of the Information Technology
Laboratory at the National Institute of Standards and Technology (NIST). Part I
(Overview) provides a high-level overview of the Division’s activities, including highlights of technical accomplishments
during the previous year. Part II (Features) provides further details on three
projects of note this year. This is followed in Part III (Project Summaries) by
brief synopses of all technical projects active during the past year. Part IV
(Activity Data) provides listings of publications, technical talks, and other
professional activities in which Division staff members have participated. The
reporting period covered by this document is October 2016 through December
2017.
Codes
for the Identification of Federal and Federally-Assisted Organizations
(NIST Special Publication 800-87r2) This document provides the organizational codes for
federal agencies to establish the Federal Agency Smart Credential Number (FASC-N) that is required
to be included in the FIPS 201 Card Holder Unique Identifier. SP 800-87 is a companion
document to FIPS 201.
Criticality
Analysis Process Model (NISTIR 8179) In the modern world, where complex systems and
systems-of-systems are integral to the functioning of society and businesses,
it is increasingly important to be able to understand and manage risks that
these systems and components may present to the missions that they support.
However, in the world of finite resources, it is not possible to apply equal
protection to all assets. This publication describes a comprehensive
Criticality Analysis Process Model -- a structured method of prioritizing
programs, systems, and components based on their importance to the goals of an
organization and the impact that their inadequate operation or loss may present
to those goals. A criticality analysis can help organizations identify and
better understand the systems, subsystems, components, and subcomponents that
are most essential to their operations and the environment in which they
operate. That understanding facilitates better decision making related to the
management of an organization's information assets, including information
security and privacy risk management, project management, acquisition,
maintenance, and upgrade decisions. The Model is structured to logically follow
how organizations design and implement projects and systems, can be used as a
component of a holistic and comprehensive risk management approach that
considers all risks, and can be used with a variety of risk management
standards and guidelines.
Fog
Computing Conceptual Model (NIST Special Publication 500-325) Managing the
data generated by Internet of Things (IoT) sensors and actuators is one of the
biggest challenges faced when deploying an IoT system. Traditional cloud-based
IoT systems are challenged by the large scale, heterogeneity, and high latency
witnessed in some cloud ecosystems. One solution is to decentralize
applications, management, and data analytics into the network itself using a
distributed and federated computer model. This approach has become known as fog
computing. This document presents a definition of fog and mist computing and
how they relate to cloud-based computing models for IoT. The document further
characterizes important properties and aspects of fog computing, including service
models, deployment strategies, and provides a baseline of what fog computing
is, and how it may be used.
IREX IX Part One, Performance of Iris Recognition
Algorithms (NISTIR 8207) Iris Exchange (IREX) IX is an evaluation of automated
iris recognition algorithms. The first part of the evaluation is a performance
test of both verification (one-to-one) and identification (one-to-many)
recognition algorithms over operational test data. The results are summarized
in this report. Thirteen developers submitted recognition algorithms for
testing, more than any previous IREX evaluation. Performance was measured for
46 matching algorithms over a set of approximately 700K field-collected iris
images. This report is very similar to IREX IV: Part 1, Evaluation of Iris
Identification Algorithms [1] in both format and scope.
Recommendation for Key-Derivation Methods
in Key-Establishment Schemes (NIST Special Publication 800-56Cr1) This Recommendation specifies
techniques for the derivation of keying material from a shared secret
established during a key-establishment scheme defined in NIST Special
Publications 800-56A or 800-56B.
Recommendation for Pair-Wise
Key-Establishment Schemes Using Discrete Logarithm Cryptography (NIST
Special Publication 800-56Ar3 This Recommendation specifies key-establishment schemes
based on the discrete logarithm problem over finite fields and elliptic curves,
including several variations of Diffie-Hellman and Menezes-Qu-Vanstone (MQV)
key establishment schemes.
Security Content Automation Protocol (SCAP) Version
1.3 Validation Program Test Requirements (NISTIR 7511rev5) This report defines the requirements and associated test
procedures necessary for products or modules to achieve one or more Security
Content Automation Protocol (SCAP) validations. Validation is awarded based on
a defined set of SCAP capabilities by independent laboratories that have been
accredited for SCAP testing by the NIST National Voluntary Laboratory
Accreditation Program (NVLAP).
|