National Institute of Standards and Technology (NIST)
YouTube ... Quora ...Google search ...Google News ...Bing News
- Cybersecurity ... OSINT ... Frameworks ... References ... Offense ... NIST ... DHS ... Screening ... Law Enforcement ... Government ... Defense ... Lifecycle Integration ... Products ... Evaluating
- Risk, Compliance and Regulation ... Ethics ... Privacy ... Law ... AI Governance ... AI Verification and Validation
Contents
Official U.S. Time
NIST Official U.S. Time refers to the timekeeping service provided by the National Institute of Standards and Technology (NIST) in the United States. NIST operates atomic clocks and maintains highly accurate time standards that serve as the official source of time for the country.
- Timekeeping and synchronization: NIST's timekeeping service is crucial for ensuring accurate time synchronization across various systems, devices, and networks. By providing an authoritative and reliable time reference, NIST helps maintain consistency and precision in timekeeping applications, such as telecommunications, financial transactions, scientific research, and network operations.
- Atomic clocks and UTC: NIST operates a network of atomic clocks, including cesium fountain clocks and hydrogen maser clocks, which are highly precise and stable timekeeping devices. These clocks are used to generate Coordinated Universal Time (UTC), a standardized global time scale that is widely used as a reference for timekeeping worldwide.
- NIST time dissemination methods: NIST distributes its official time through various methods to ensure widespread availability and accessibility. These include the internet-based Network Time Protocol (NTP), telephone services, radio broadcasts, and satellite signals. These dissemination methods allow users to synchronize their clocks and systems with the official U.S. time provided by NIST.
- NIST time services: In addition to providing accurate time information, NIST offers various time services to assist users in synchronizing their systems and applications. These services include the NIST Internet Time Service (ITS), which provides time information via NTP over the internet, and the Automated Computer Time Service (ACTS), which delivers time signals through telephone modems.
- Role in time standards: NIST plays a significant role in establishing and maintaining international time standards. It collaborates with other national metrology institutes and organizations, such as the International Bureau of Weights and Measures (BIPM), to ensure the accuracy and uniformity of timekeeping worldwide. NIST's contributions help support global time synchronization and coordination.
The NIST Official U.S. Time service provided by the National Institute of Standards and Technology serves as a vital resource for accurate timekeeping and synchronization in the United States. Through its network of atomic clocks and reliable time dissemination methods, NIST ensures the availability of precise time information for a wide range of applications. Its contributions to international time standards further strengthen the global framework for accurate and synchronized timekeeping.
Risk Management
- Singularity ... Sentience ... AGI ... Curious Reasoning ... Emergence ... Moonshots ... Explainable AI ... Automated Learning
Artificial Intelligence (AI)
AI Risk Management Framework (AI RMF)
- On March 30, 2023 NIST launched the Trustworthy and Responsible AI Resource Center, which will facilitate implementation of, and international alignment with, the AI Risk Management Framework (AI RMF).
- On January 26, 2023, NIST released the AI Risk Management Framework (AI RMF 1,0) along with a companion NIST AI RMF Playbook, AI RMF Explainer Video, an AI RMF Roadmap, AI RMF Crosswalk, and various Perspectives.
AI Assurance Programs
- Microsoft unveils Azure OpenAI Service for government & AI customer commitments | Carl Franzen - Venture Beat ... Azure OpenAI Service REST APIs, which allow government customers to build new applications or connect existing ones to OpenAI’s GPT-4, GPT-3, and Embeddings
- Microsoft to launch AI Assurance Program as one of three commitments for responsible AI | Amber Hickman - Technology Record
Microsoft's program will help customers ensure that the AI applications they deploy on Microsoft’s platforms comply with legal and regulatory requirements for responsible AI. It will include elements such as regulator engagement support, implementation of the AI Risk Management Framework published by the U.S. National Institute of Standards and Technology (NIST), customer councils for feedback, and regulatory advocacy.
“Ensuring the right guardrails for the responsible use of AI will not be limited to technology companies and governments; every organisation that creates or uses AI systems will need to develop and implement its own governance systems,” said Antony Cook, corporate vice president and deputy general counsel at Microsoft.
The program will focus on regulator engagement support that will apply what Microsoft calls the ‘KY3C’ approach: know your cloud, customer and content. Microsoft will also provide a risk framework implementation, customer councils and regulatory advocacy for governments and stakeholders, which involves a blueprint from Microsoft’s vice chair and president Brad Smith.
Risk Management Framework (RMF)
- Cybersecurity
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Radial Basis Function Network (RBFN)
- Quantum Cryptographic Technology
- Federal Risk and Authorization Management Program (FedRAMP) | NIST
- Cybersecurity Framework | NIST
- AI Risk Management Framework (AI RMF 1.0 | NIST
- NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices | Chad Boutin - NIST ... The algorithms are designed to protect data created and transmitted by the Internet of Things and other small electronics. The winner, a group of cryptographic algorithms called Ascon, will be published as NIST’s lightweight cryptography standard later in 2023
- NIST Launches New Trustworthy and Responsible AI Resource Center: Includes First Version of AI Risk Management Framework Playbook
Post-Quantum Cryptography (PQC)
- Quantum Cryptography
- Side Channel Attack (SCA)
- Migrating to Post-Quantum Cryptography | The White House
- Quantum apocalypse: Experts warn of ‘store now, decrypt later’ hacks | Leigh McGowran - Silicon Republic
- The impact of Quantum Computing on cybersecurity | Forta Tripwire
- Post Quantum Solutions
In cryptography, post-quantum cryptography (PQC) (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against a cryptanalytic attack by a quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems could be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several workshops on Quantum Safe Cryptography hosted by the European Telecommunications Standards Institute (ETSI) and the Institute for Quantum Computing. In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. - Wikipedia
Quantum Apocalypse: Store Now, Decrypt Later (DNDL) ... stealing data now to decrypt it in future, as quantum computing could render modern encryption methods obsolete
NIST Standardization process for PQC
- Post-Quantum Cryptography (PQC) | NIST
- National Security Agency (NSA)
- NIST winners and will ratify standards in 2024
- Multiple global rounds since 2015 led to NIST announcing winners in July 22 - four algorithms:
- CRYSTALS-KYBER was chosen by NIST as the new standard for public-key encryption/KEMs
- Falcon, CRYSTALS-Dilithium and SPHINCS+ will all be standardized for digital signatures
- There are more algorithms under consideration too, so the process continues
Automate Cybersecurity Maturity Model Certification (CMMC) Privacy & Security Notices with GPT-4 | NIST SP 800-171
Secure your Controlled Unclassified Information (CUI) with NIST SP 800-171, Practice AC.L2-3.1.9! In this episode, we'll guide you through the process of providing consistent privacy and security notices in compliance with CUI rules. Learn how to identify the necessary notices, craft them in line with CUI requirements, and display them effectively to your users. Gain insights into the right solutions and administrative controls to make your data protection practices robust and reliable. We're here to make compliance easy and understandable.
Automate your cmmc compliance efforts using ChatGPT