Cryptography

  1. Cryptographic Standards and Compliance
    1. Cryptographic Standards Organizations
      1. National Institute of Standards and Technology
        1. FIPS Publications
          1. NIST Special Publications
            1. Cryptographic Algorithm Validation Program
            2. International Organization for Standardization
              1. ISO/IEC 18033 Series
                1. ISO/IEC 19790 and 19792
                  1. Common Criteria
                  2. Internet Engineering Task Force
                    1. RFC Standards
                      1. Cryptographic Protocols
                        1. Security Considerations
                        2. Institute of Electrical and Electronics Engineers
                          1. IEEE 802.11 Security
                            1. IEEE 1363 Standards
                          2. Compliance Frameworks
                            1. Federal Information Processing Standards
                              1. FIPS 140-2 and FIPS 140-3
                                1. Security Levels
                                  1. Testing Requirements
                                  2. Common Criteria
                                    1. Evaluation Assurance Levels
                                      1. Protection Profiles
                                        1. Security Targets
                                        2. Industry-Specific Requirements
                                          1. Payment Card Industry Standards
                                            1. Healthcare Regulations
                                              1. Financial Services Requirements
                                            2. Cryptographic Implementation Guidelines
                                              1. Secure Coding Practices
                                                1. Input Validation
                                                  1. Error Handling
                                                    1. Memory Management
                                                    2. Key Management Standards
                                                      1. Key Lifecycle Management
                                                        1. Hardware Security Requirements
                                                          1. Audit and Compliance
                                                          2. Algorithm Selection Guidelines
                                                            1. Approved Algorithms
                                                              1. Key Size Recommendations
                                                                1. Transition Timelines