home || catalog: SP800-53rev3 / class: Technical / family: (SC) System and Communications Protection ||
search controls:
search nistpubs:

AC
AT
AU
CA
CM
CP
IA
IR
MA
MP
PE
PL
PM
PS
RA
SA
SC

SC-01
SC-02
SC-03
SC-04
SC-05
SC-06
SC-07
SC-08
SC-09
SC-10
SC-11
SC-12
SC-13 *
SC-14
SC-15
SC-16
SC-17
SC-18
SC-19
SC-20
SC-21
SC-22
SC-23
SC-24
SC-25
SC-26
SC-27
SC-28
SC-29
SC-30
SC-31
SC-32
SC-33

SI
MMMMM

  SC-13: Use of Cryptography  

base control objective:
The information system implements required cryptographic protections using cryptographic modules that comply with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.

supplemental objective information:
None.

enhancements to the base objective:

(1) None.

mapping to FIPS199 baseline:

  LOW: base     MOD: base     HIGH: base  

related (regimented) controls:

None.

documents referenced in SP800-53rev3 for SC-13:

Document Date Status Title
FIPS 140-1 January, 1994 current   Security Requirements for Cryptographic Modules
FIPS 140-2 May, 2001 current   Security Requirements for Cryptographic Modules
FIPS 180 February, 2011 DRAFT   Secure Hash Standard (SHS)
FIPS 186-3 June, 2009 current   Digital Signature Standard (DSS)
FIPS 190 September, 1994 current   Guideline for the Use of Advanced Authentication Technology Alternatives, September 1994
FIPS 197 November, 2001 current   Advanced Encryption Standard
FIPS 198 July, 2008 current   The Keyed-Hash Message Authentication Code (HMAC)
FIPS 201-1 March, 2006 current   Personal Identity Verification (PIV) of Federal Employees and Contractors
NIST SP800-107 August, 2012 current   Recommendation for Applications Using Approved Hash Algorithms
NIST SP800-12 October, 1995 current   An Introduction to Computer Security: The NIST Handbook
NIST SP800-17 February, 1998 current   Modes of Operation Validation System (MOVS): Requirements and Procedures
NIST SP800-20 April, 2000 current   Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
NIST SP800-21 December, 2005 current   Guideline for Implementing Cryptography in the Federal Government
NIST SP800-22rev1a April, 2010 current   A Statistical Test Suite for Random and Pseudo-random Number Generators for Cryptographic Applications
NIST SP800-29 June, 2001 current   A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2
NIST SP800-32 February, 2001 current   Introduction to Public Key Technology and the Federal PKI Infrastructure
NIST SP800-38a December 2001 DRAFT   Recommendation for Block Cipher Modes of Operation - Methods and Techniques
NIST SP800-38b May, 2005 current   Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication
NIST SP800-38c May, 2004 current   Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
NIST SP800-38d April, 2006 current   Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
NIST SP800-56a March, 2006 current   Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
NIST SP800-57, part1 August, 2005 current   Recommendation for Key Management, part 1
NIST SP800-63 April, 2006 current   Electronic Authentication Guideline
NIST SP800-67 Jan 2012 current   Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
NIST SP800-78 December, 2010 current   Cryptographic Algorithms and Key Sizes for Personal Identity Verification
NIST SP800-90 January, 2012 current   Recommendation for Random Number Generation Using Deterministic Random Bit Generators

Search SP800-53rev3 catalog: