Jump to ratings and reviews
Rate this book

Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography: NiST SP 800-56A R3

Rate this book
NIST SP 800-56A REV. 3 April 2018

This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-Qu-Vanstone (MQV) key establishment schemes.

Why buy a book you can download for free?

First you gotta find a good clean (legible) copy and make sure it’s the latest version (not always easy). Some documents found on the web are missing some pages or the image quality is so poor, they are difficult to read. We look over each document carefully and replace poor quality images by going back to the original source document. We proof each document to make sure it’s all there – including all changes. If you find a good copy, you could print it using a network printer you share with 100 other people (typically its either out of paper or toner). If it’s just a 10-page document, no problem, but if it’s 250-pages, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. The Kindle version includes hyperlinks for easy page navigation.

It’s much more cost-effective to just order the latest version from Amazon.com

This book is published by 4th Watch Books and includes copyright material. We publish compact, tightly-bound, full-size books (8 ½ by 11 inches), with glossy covers. 4th Watch Books is a Service Disabled Veteran-Owned Small Business (SDVOSB).

For more titles published by 4th Watch Books, please cybah.webplus.net

A full copy of all the pertinent cybersecurity standards is available on DVD-ROM in the CyberSecurity Standards Library disc which is available at Amazon.com.

UFC 4-010-06 Cybersecurity of Facility-Related Control Systems

NIST SP 800-82 Guide to Industrial Control Systems (ICS) Security

Whitepaper NIST Framework for Improving Critical Infrastructure Cybersecurity

NISTIR 8170 The Cybersecurity Framework

FC 4-141-05N Navy and Marine Corps Industrial Control Systems Monitoring Stations

UFC 3-430-11 Boiler Control Systems

NISTIR 8089 An Industrial Control System Cybersecurity Performance Testbed

UFC 1-200-02 High-Performance and Sustainable Building Requirements

NIST SP 800-12 An Introduction to Information Security

NIST SP 800-18 Developing Security Plans for Federal Information Systems

NIST SP 800-31 Intrusion Detection Systems

NIST SP 800-34 Contingency Planning Guide for Federal Information Systems

NIST SP 800-35 Guide to Information Technology Security Services

NIST SP 800-39 Managing Information Security Risk

NIST SP 800-40 Guide to Enterprise Patch Management Technologies

NIST SP 800-41 Guidelines on Firewalls and Firewall Policy

NIST SP 800-44 Guidelines on Securing Public Web Servers

NIST SP 800-47 Security Guide for Interconnecting Information Technology Systems

NIST SP 800-48 Guide to Securing Legacy IEEE 802.11 Wireless Networks

NIST SP 800-53A Assessing Security and Privacy Controls

NIST SP 800-61 Computer Security Incident Handling Guide

NIST SP 800-77 Guide to IPsec VPNs

NIST SP 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops

NIST SP 800-92 Guide to Computer Security Log Management

NIST SP 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS)

154 pages, Paperback

Published August 7, 2017

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.