ITL Newsletter for March-April 2019

ISSUE 157

March - April 2019

VIEW AS WEBPAGE

information technology laboratory

 CULTIVATING TRUST IN IT AND METROLOGY

IN THIS ISSUE

AI picture

Credit: N. Hanacek/NIST

NIST AND THE EXECUTIVE ORDER ON MAINTAINING AMERICAN LEADERSHIP IN ARTIFICIAL INTELLIGENCE

On Feb. 11, 2019, President Donald J. Trump issued the Executive Order on Maintaining American Leadership in Artificial Intelligence.

The EO specifically directs NIST to create “a plan for Federal engagement in the development of technical standards and related tools in support of reliable, robust, and trustworthy systems that use AI technologies.”

“A key to adoption and acceptance of AI technologies is that they be seen as trustworthy,” said Under Secretary of Commerce for Standards and Technology and NIST Director Walter G. Copan. “The National Institute of Standards and Technology is a leader in advancing foundational research that informs the development of technical standards and tools for information technology. 

READ MORE

NEWS UPDATES

NIST REVEALS 26 ALGORITHMS ADVANCING TO THE POST-QUANTUM CRYPTO SEMIFINALS

Algorithm

The field has narrowed in the race to protect sensitive electronic information from the threat of quantum computers, which one day could render many of our current encryption methods obsolete. 

As the latest step in its program to develop effective defenses, the National Institute of Standards and Technology (NIST) has winnowed the group of potential encryption tools—known as cryptographic algorithms—down to a bracket of 26. These algorithms are the ones NIST mathematicians and computer scientists consider to be the strongest candidates submitted to its Post - Quantum Cryptography Standardization project, whose goal is to create a set of standards for protecting electronic information from attack by the computers of both tomorrow and today. 

READ MORE

NIST MARKS FIFTH ANNIVERSARY OF POPULAR CYBERSECURITY FRAMEWORK

cybersecurity

Five years after the release of the Framework for Improving Critical Infrastructure Cybersecurity, organizations across all sectors of the economy are creatively deploying this voluntary approach to better management of cybersecurity-related risks.  

The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) issued what is now widely known simply as the “NIST Cybersecurity Framework” on February 12, 2014. Its development was the result of a year-long collaborative process involving hundreds of organizations and individuals from industry, academia and government agencies. 

READ MORE

ITL'S DIGITAL LIBRARY OF MATHEMATICAL FUNCTIONS

A function is a mathematical tool that expresses how a quantity of interest (the output) depends on its input. Mathematical functions are essential components of mathematical models in all areas of science and engineering. They are used to help describe everything from how sunlight creates rainbows to how atoms interact. The NIST Digital Library of Mathematical Functions is a free online reference that describes the properties of commonly occurring mathematical functions. 

 

PROFILES OF ITL DIVISIONS

Software and Systems Division
Ram Sriram, Chief

The Software and Systems Division (SSD) is one of seven technical divisions in the Information Technology at the National Institute of Standards and Technology. We work with industry, academia and other government agencies to accelerate the development and adoption of correct, reliable and testable software. This collaborative effort leads to increased trust and confidence in deployed software and methods to develop better standards and testing tools.

SSD focuses on advances in state-of-the-art software testing by developing scientifically rigorous and innovative techniques for software testing. Finally, we facilitate the transfer of applications and technologies into national infrastructures and commercial sectors. 

READ MORE

 

Ram Sriram

STAFF ACCOMPLISHMENTS

 

Ron Ross, NIST Fellow, Receives Federal 100 Award

The Federal 100 Awards are presented to government, industry and academic leaders who have gone above and beyond to make a real difference in the way technology was bought, managed and used in the federal IT community.

Lily Chen, Group Leader, Computer Security Division, Receives Federal 100 Award

The Federal 100 Awards are presented to government, industry and academic leaders who have gone above and beyond to make a real difference in the way technology was bought, managed and used in the federal IT community.

Ellen Voorhees, Information Access Division, Named Association for Computing Machinery (ACM) Fellow

For contributions in evaluation of information retrieval, question answering, and other language technologies. ACM's most prestigious member grade recognizes the top 1% of ACM members for their outstanding accomplishments in computing and information technology and/or outstanding service to ACM and the larger computing community. Candidates for Fellow must have 5 years of continuous Professional Membership.

 

SELECTED NEW PUBLICATIONS

Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process (NISTIR 8240)

The National Institute of Standards and Technology is in the process of selecting one or more public-key cryptographic algorithms through a public competition-like process. The new public-key cryptography standards will specify one or more additional digital signature, public-key encryption, and key-establishment algorithms to augment FIPS 186-4, Digital Signature Standard (DSS), as well as special publications SP 800-56A Revision 2, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, and SP 800-56B, Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization. It is intended that these algorithms will be capable of protecting sensitive information well into the foreseeable future, including after the advent of quantum computers.

Organizational Views of NISTCryptographic Standards and Testing and Validation Programs (NISTIR 8241)

Cryptography is an essential component of modern computing. Unfortunately, implementing cryptography correctly is a non-trivial undertaking. Past research studies have supported this observation by revealing a multitude of errors and pitfalls in the cryptographic implementations of software products. However, the emphasis of these studies was on the practices of less-experienced, individual developers. Therefore, there is little understanding of the cryptographic development practices of organizations, including the benefits and challenges of using cryptographic resources such as standards specifications and libraries. To address this gap, a research team led by the National Institute of Standards and Technology (NIST) Information Technology Laboratory Visualization and Usability Group conducted a qualitative investigation into the processes and resources that organizations employ in the development and testing of cryptographic products.

A Calibration of Timing Accuracy in the NIST Cyber-Physical Systems Testbed (NIST TN 2030)

We propose a general methodology for assessing the time accuracy and uncertainties, and report results from a project to calibrate timing in the NIST Cyber-Physical System (CPS) and Smart Grid Testbeds. We measured clock synchronization accuracy and stability as well as latencies for potential experiments in the testbeds.

Defining ‘kind of quantity’ (NIST TN 2034)

The definition of ‘kind of quantity’ given in the International Vocabulary of Metrology(VIM), 3rd edition, does not cover the historical meaning of the term as it is most commonly used in metrology. Most of its historical meaning has been merged into ‘quantity,’ which is polysemic across two layers of abstraction. I propose a model of ‘kind of quantity’ that is compatible with its historical meaning and distinguishable from ‘quantity in a general sense.'

A General Methodology for Deriving Network Propagation Models of Computer Worms (NIST TN 2035)

Externally-launched computer worms which maliciously propagate within networks are one of the most serious and dangerous security threats facing the commercial, political, military, and research communities today. With an eye to the ultimate goal of detection and prevention of such worms, the purpose of this paper is twofold: to develop predictive models for the number of infected hosts per iteration and the number of iterations to saturation, and to present a systematic methodology (simulator construction + data generation + 2 sequential fitting steps) for the construction of such models. This methodology will have application across a variety of worm-modeling scenarios.

CONFERENCE CALENDAR

March

March

4-8

RSA Conference

READ MORE

March

11

NIST Threshold Cryptography Workshop 2019

READ MORE

March

19

NCSI Seminar: Challenges in Programming The Next Generation of HPC Systems

READ MORE


for more events click on calendar