The guidelines include one algorithm to enable secure communications through encryption, and two algorithms for 'digital signatures', which prevent hackers from impersonating a known user or device.
"These finalized standards include instructions for incorporating them into products and encryption systems," says Dustin Moody, a mathematician at NIST who has led the standardization effort.
Digital communications and transactions such as online shopping almost universally rely on a small set of algorithms for 'public-key' cryptography, which allow two parties to exchange information securely.
Collection
[
|
...
]