ITL Newsletter for May-June 2019

ISSUE 158

MAY- JUNE 2019

VIEW AS WEBPAGE

information technology laboratory

 CULTIVATING TRUST IN IT AND METROLOGY

IN THIS ISSUE

biometrics

BIOMETRIC STANDARDS FOR LAW ENFORCEMENT

Border security, crime investigations, background checks and access control all rely on certain organizations being able to seamlessly exchange biometric data such as fingerprints. NIST led the development of a standard that made this exchange possible by providing a common language and standardized format for biometric data and information about how it was collected.

READ MORE

NEWS UPDATES

SMALL BUSINESS CYBERSECURITY CORNER

SMALL BUSINESS

The vast majority of smaller businesses rely on information technology to run their businesses and to store, process, and transmit information. Protecting this information from unauthorized disclosure, modification, use, or deletion is essential for those companies  and their customers. With limited resources and budgets, these companies need cybersecurity guidance, solutions, and training that is practical, actionable, and enables them to cost-effectively address and manage their cybersecurity risks. This NIST Small Business Cybersecurity Corner puts these key resources in one place.      

READ MORE

LIGHTWEIGHT CRYPTOGRAPHY (LWC) STANDARDIZATION: ROUND 1 CANDIDATES ANNOUNCED

crypto

 

NIST has completed the initial check of all algorithm submission packages received in response to the August 27, 2018 Request for Nominations for Lightweight Cryptographic Algorithms. Fifty-six (56) of these submissions were accepted as complete and proper. LWC Round 1 candidates have been announced on the Round 1 Candidates page of the Lightweight Cryptography project.

READ MORE

NIST/SEMATECH ENGINEERING STATISTICS HANDBOOK

The NIST/SEMATECH e-Handbook of Statistical Methods is a Web-based book written to help scientists and engineers incorporate statistical methods into their work as efficiently as possible. Ideally, it will serve as a reference which will help scientists and engineers design their own experiments and carry out the appropriate analyses when a statistician is not available to help. It is also hoped that it will serve as a useful educational tool that will help users of statistical methods and consumers of statistical information better understand statistical procedures and their underlying assumptions, and more clearly interpret scientific and engineering results stated in statistical terms. 

READ MORE

  

 

PROFILES OF ITL DIVISIONS

Statistical Engineering Division

William Guthrie, Chief

 

The Statistical Engineering Division is one of seven technical divisions in the Information Technology Laboratory. The Statistical Engineering Division:

  • Develops and applies best practices for the characterization of measurement uncertainty, in particular to enable the intercomparison of measurements in the context of interlaboratory studies and calibrations; implements methods and techniques for experimental design, data analysis, statistical modeling and probabilistic inference in computer software.
  • Disseminates such methods and techniques throughout U.S. industry, and the scientific and academic communities at large, by publishing technical and educational materials in print and on-line, by offering training courses and workshops, and by participating in professional conferences.
  • Conducts fundamental and applied statistical research on problems in metrology and collaborates on research in other Divisions of ITL, in other Laboratories of NIST and with NIST's industrial partners.

READ MORE

 

 

STAFF ACCOMPLISHMENTS

Sal Francomacaro

Sal Francomacaro, Computer Security Division, was awarded the INCITS Merit Award to recognize his more than 10+ year as a member with significant contributions to at least two international Subcommittees or Working Groups in a technical contributor or leadership role and demonstrated continuous support for the work of the InterNational Committee for Information Technology Standards (INCITS).

 

SELECTED NEW PUBLICATIONS

2017 Pilot Open Speech Analytic Technologies Evaluation (2017 NIST Pilot OpenSAT) (NISTIR 8242)

NIST conducted the 2017 Pilot Open Speech Analytic Technologies Evaluation (OpenSAT) Evaluation as the first in a new type of evaluation series.  This new series is being designed to combine data domains and speech-analytic tasks including the public-safety-communications domain. This report summarizes the set up and results of the Pilot.  The report includes 1) anonymous, composite plots, 2) an analysis of systems output, and 3) the dataset challenges in the evaluation. The methods used in the Pilot OpenSAT Evaluation included speech-activity detection; keyword search; automatic, speech recognition; and, three data domains.  Those domains were low-resource language, public-safety communications, and YouTube videos.  For the speech-analytics task, participants in the evaluation could choose one or all of the methods and one or all of the data domains.

Recommendation: Closed Circuit Television (CTV) Digital Video Export Profile - Level 0 (Revision 1) (NISTIR 8161)

This document updates and replaces NISTIR 8161.This revised recommendation continues to focus on storing metadata to support video analytics. It reflects NIST’s collaboration with relevant standards community members to facilitate an effective approach workable to all involved.

Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography (SP800 56BR2)

This Recommendation specifies key-establishment schemes using integer   factorization cryptography (in particular, RSA). Both key-agreement and key transport schemes are specified for pairs of entities, and methods for key confirmation are included to provide assurance that both parties  share  the  same  keying  material.  In  addition,  the  security properties  associated  with  each  scheme are provided.

Threshold Schemes for Cryptographic Primitives (NISTIR 8214)

This document overviews the possibility of implementing cryptographic primitives using threshold schemes, where multiple components contribute to the operation in a way that attains the desired security goals even if f out of n of its components are compromised. There is also an identified potential in providing resistance against side-channel attacks, which exploit inadvertent leakage from real implementations. Security goals of interest include the secrecy of cryptographic keys, as well as enhanced integrity and availability, among others.

Transitioning the Use of Cryptographic Algorithms and Key Lengths (SP800-56Br2)

The National Institute of Standards and Technology (NIST) provides cryptographic  key management guidance for defining and implementing appropriate key  management procedures, using algorithms that adequately protect sensitive information, and planning ahead for possible changes in the use of cryptography because of algorithm breaks or the availability of more powerful computing techniques. NIST Special Publication (SP) 800-57, Part 1, Recommendation for Key Management: General, includes a general approach for transitioning from one algorithm or key length to another. This Recommendation (SP 800-131A)  provides  more  specific  guidance  for  transitions to the use of stronger cryptographic keys and more robust algorithms.

Voices of First Responders- Examining Public Safety Communication Problems and Requested Functionality
(NISTIR 8245)

The public safety community has a unique opportunity to improve communication technology for incident response with the creation of the national public safety broadband network (NPSBN). Understanding the problems currently being experienced by first responders with communication technology as well as first responders’  communication technology requests provides the basis for addressing and developing solutions  to improve public safety communication. The National  Institute of Standards and Technology Public Safety Communications Research usability team has conducted in-depth interviews with approximately 200 first  responders representing 13 states in eight Federal Emergency Management  Agency (FEMA) regions. The population sample includes urban, suburban, and rural locations, and various levels  in  the  chain of command within the fire, law  enforcement, emergency medical services, and communications center disciplines.



CONFERENCE CALENDAR

MAY - JUNE

May 

7

NCSI Seminar: Transforming Science through Cyberinfrastructure: NSCI and NSF's Vision for a National Cyberinfrastructure Ecosystem

READ MORE


May 

13-14

Drafting the NIST Privacy Framework: Workshop #2

READ MORE

June

27-29

FISSEA 2019

READ MORE


for more events click on calendar