ITL HOME FIPS HOME NIST HOME



Federal Information Processing Standards Publications
(FIPS PUBS)



FIPS LISTED BY NUMBER

Last Update June 1999




The FIPS on this Web page are listed by number and include a brief abstract. Links are provided to available online FIPS.

Below is a list of FIPS categories. Clicking on any category will take you to the FIPS by Category Web page.

General Publications (GP)
Hardware and Software Standards/Guidelines (HS)
Data Standards/Guidelines (DATA)
Telecommunications Standards (TELECOM)
Computer Security Standards/Guidelines (CS)
Federal Telecommunications Standards (FED-STDS)


FIPS NO. TITLE-DATE & BRIEF DESCRIPTION



4-2 Representation of calendar date to facilitate interchange of data among information systems. This standard adopts American National Standard ANSI X3.30-1997: Representation of Date for Information Interchange (revision of ANSI X3.30-1985 (R1991)).
- This standard provides a means of representing calendar date to facilitate interchange of data among information systems. Adopts American National Standard ANSI X3.30-1997: Representation of Date for Information Interchange (revision of ANSI X3.30-1985 (R1991)).

FIPS 4-2 supersedes FIPS PUB 4-1, dated January 27, 1988, and updates the standard for representing calendar date and implements the Federal Government's commitment to use four-digit year elements (e.g., 1999, 2000, etc.) in its information technology systems.
5-2 Codes for the Identification of the States, the District of Columbia and the Outlying Areas of the United States, and Associated Areas -- 87 May 28
- Provides a set of two-digit numeric codes and a set of two-letter alphabetic codes for representing the 50 states, the District of Columbia and the outlying areas of the U.S., and associated areas such as the Federated States of Micronesia and Marshall Islands, and the trust territory of Palau.

6-4 Counties and Equivalent Entities of the U.S., Its Possessions, and Associated Areas -- 90 Aug 31
- Provides the names and three-digit codes that represent the counties and statistically equivalent entities of the 50 States, the District of Columbia, and the possessions and associated areas of the United States, for use in the interchange of formatted machine-sensible data. Implements ANSI X3.31-1988.

8-6, HTML version
Metropolitan Areas (Including MSAs, CMSAs, PMSAs, and NECMAs) -- 95 Mar --
- Provides a four-digit numeric code for each Metropolitan Area (Mas) in the U.S. and Puerto Rico, including units called Metropolitan Statistical Areas (MSAs), Consolidated Metropolitan Statistical Areas (CMSAs), and Primary Metropolitan Statistical Areas (PMSAs), and related units called New England County Metropolitan Areas (NECMAs). The general concept underlying MAs is that of a core area containing a large population nucleus together with adjacent communities having a high degree of economic and social integration with that core.


9-1 Congressional Districts of the U.S. -- 90 Nov 30
- Provides the structure of numeric codes for representing congressional districts and similar areas defined for the various Congresses of the United States.

10-4Countries, Dependencies, Areas of Special Sovereignty, and Their Principal Administrative Divisions -- 95 Apr --
- Provides a list of the basic geopolitical entities in the world, together with the principal administrative divisions that comprise each entity. Each basic geopolitical entity is represented by a two-character, alphabetic country code. Each principal administrative division is identified by a four-character code consisting of the two-character country code followed by a two-character administrative division code. These codes are intended for use in activities associated with the mission of the Department of State and in National defense programs.
NOTE: Change notices for FIPS 10-4 are issued by the National Imagery and Mapping Agency (NIMA), and are available on NIMA's GEOnet Names Server (GNS) at: http://164.214.2.59/gns/html/FIPS/ FIPS_Files.html

29-3 Interpretation Procedures for Federal Information Processing Standards for Software -- 1992 Oct 29
- Establishes procedures for requesting an interpretation of the technical specifications of the FIPS for software and for providing a solution to the request.

31 Guidelines for Automatic Data Processing Physical Security and Risk Management -- 74 June --
- Provides guidance to Federal organizations in developing physical security and risk management programs for their ADP facilities. Can be used as a checklist for planning and evaluating security of computer systems.

46-2 Data Encryption Standard -- 93 Dec 30
- Reaffirms the Data Encryption Algorithm until 1998, and allows for implementation of the algorithm in hardware, software, firmware or any combination thereof. The data encryption algorithm uniquely defines the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. Encryption may be used by Federal organizations to protect sensitive data during transmission or while in storage.

A revision to FIPS 46-2 was proposed in Federal Register notice, January 15, 1999. The comment period for this proposed revised standard closes on April 15, 1999. To be issued as FIPS 46-3, the revised standard provides for the use of Triple DES as specified by the American National Standards Institute (ANSI X9.52). The proposed FIPS 46-3 is available electronically.


48 Guidelines on Evaluation of Techniques for Automated Personal Identification -- 77 Apr 01
- Discusses the performance of personal identification devices, how to evaluate them, and considerations for their use within the context of computer system security.

55-DC3
1998 version
Guideline: Codes for Named Populated Places, Primary County Divisions, and Other Locational Entities of the United States, Puerto Rico, and the Outlying Areas -- 94 Dec 28
- Provides a two-character State code and five-character numeric place code to uniquely identify each listed entity. An exhaustive list is carried of incorporated places, census designated places, primary county divisions, recognized Indian reservations and Alaska Native villages, and counties. For the data files, request the fifth printed version (hard copy) or the tenth update tape. Implements ANSI X3.47-1993.

55-3 Same as 55-DC3 except without codes -- 94 Dec 28
-Same as FIPS PUB 55-DC3; (DOCUMENTATION ONLY).

66 Standard Industrial Classification (SIC) Codes -- 79 Aug 15
- The Standard Industrial Classification (SIC) Manual for 1987 issued by the Office of Management and Budget in the Executive Office of the President should be used as the source of classifications, short titles, and codes for representing industries as prescribed by FIPS PUB 66.
Applicability: Systems requiring the interchange of data among Federal ADP users and internal data systems where such use contributes to operational benefits, efficiency and economy.
NOTE: (6/99) The U.S. Standard Industrial Classification (SIC) system is being replaced by the North American Industry Classification System (NAICS). NAICS is available on the Bureau of Census Web pages: http://www.census.gov/epcd/www/naics .html.


73 Guidelines for Security of Computer Applications -- 80 June 30
- Describes the different security objectives for a computer application, explains the control measures that can be used, and identifies the decisions that should be made at each stage in the lifecycle of a sensitive computer application. For use in planning, developing and operating computer systems which require protection.

74 Guidelines for Implementing and Using the NBS Data Encryption Standard -- 81 Apr 01
- Provides guidance for the use of cryptographic techniques when such techniques are required to protect sensitive or valuable computer data. For use in conjunction with FIPS PUB 81.

81 DES Modes of Operation -- 1980 December 2
- This standard provides specifications of the recommended modes of operation but does not specify the necessary and sufficient conditions for their secure implementation in a particular application. This standard specifies the numbering of data bits, how the bits are encrypted and decrypted, and the data paths and the data processing necessary for encrypting and decrypting data or messages.

83 Guideline on User Authentication Techniques for Computer Network Access Control -- 80 Sept 29
-Provides guidance in the selection and implementation of techniques for authenticating the users of remote terminals in order to safeguard against unauthorized access to computers and computer networks.

87 Guidelines for ADP Contingency Planning -- 81 Mar 27
- Describes what should be considered when developing a contingency plan for an ADP facility. Provides a suggested structure and format which may be used as a starting point from which to design a plan to fit each specific operation.

92 Guideline for Standard Occupational Classification (SOC) Codes -- 83 Feb 24
-Adopts a code set developed by the Office of Management and Budget to identify types of occupational activities. The classification system includes all occupations in which work is performed for pay or profit.

95-2
HTML Version Coming Soon
CODES FOR THE IDENTIFICATION OF FEDERAL AND FEDERALLY ASSISTED ORGANIZATIONS
- Updates FIPS 95-1 (93 Jan 04) and supersedes FIPS 95-1 in its entirety. The updates include technical changes, minor editorial changes, and updated references to documents and organizations. Specifies a four-character identifier for Federal Government Legislative, Judicial and Executive Branch agencies, and for Federal-State, interstate and international organizations that receive budgetary support. Also includes government-sponsored enterprises and some Federally aided organizations.
101 Guideline for Lifecycle Validation, Verification, and Testing of Computer Software -- 83 June 06
- Presents an integrated approach to validation, verification, and testing (VV&T;) that should be used throughout the software lifecycle. Also included is a glossary of technical terms and a list of supporting NBS publications. An appendix provides an outline for formulating a VV&T; plan.

102 Guideline for Computer Security Certification and Accreditation -- 83 Sept 27
- Describes how to establish and how to carry out a certification and accreditation program for computer security. Certification consists of a technical evaluation of a sensitive system to see how well it meets its security requirements. Accreditation is the official management authorization for the operation of the system and is based on the certification process.

103 Codes for the Identification of Hydrologic Units in the United States and the Caribbean Outlying Areas (USGS/CIRCULAR878 -A&ANSIX3.145-1986;) -- 83 Nov 15
- Identifies a hydrologic system that divides the United States and Caribbean outlying areas into 21 major regions. Regions are further subdivided into approximately 2150 units that delineate river basins having drainage areas usually greater than 700 square miles. The codes provide a standardized base for use by water-resources organizations. Adopts Geological Survey Circular 878-A, which has been adopted as ANSI X3.145-1986.

106 Guideline on Software Maintenance -- 84 June 15
- Presents information on techniques, procedures, and methodologies to employ through out the lifecycle of a software system to improve the maintainability of that system. Included is a glossary of technical terms. Appendices provide information on software maintenance process; how to decide whether or not to continue maintaining a system; and software maintenance tools.

112 Password Usage -- 85 May 30
-Defines 10 factors to be considered in the design, implementation and use of access control systems that are based on passwords. It specifies minimum security criteria for such systems and provides guidance for selecting additional security criteria for password systems which must meet higher security requirements.

113 Computer Data Authentication -- 85 May 30
-Specifies a Data Authentication Algorithm (DAA) which, when applied to computer data, automatically and accurately detects unauthorized modifications, both intentional and accidental. Based on FIPS PUB 46, this standard is compatible with requirements adopted by the Department of Treasury and the banking community to protect electronic fund transfer transactions.

119-1 Ada (ANSI/ISO/IEC 8652:1995) -- 95 Mar 13
-Specifies the form and establishes the interpretation of programs expressed in the Ada programming language. Promotes portability of Ada programs for use on a variety of data processing systems. Adopts ANSI/ISO/IEC 8652:1995.

127-2 Database Language SQL (ANSI X3.135-1992) -- 93 June 02
- FIPS 127-2 adopts American National Standard ANSI X3.135-1992 Database Language SQL which defines the syntactic and semantic rules for database definition and data manipulation in a relational model database management system.

132 Guideline for Software Verification and Validation Plans (ANSI/IEEE 1012-1986) -- 87 Nov 19
-Provides uniform and minimum requirements for the format and content of software verification and validation plans. Defines minimum tasks, inputs, and outputs for critical software and optional tasks. Adopts ANSI/IEEE Standard 1012-1986.

137 Analog to Digital Conversion of Voice by 2,400 Bit/Second Linear Predictive Coding -- 84 Nov 28
-FIPS 137 specifies requirements relating to the conversion of analog voice to 2,400 bit/second digitized voice by Linear Predictive Coding (LPC-10) and reconversion back to analog voice.

139 Interoperability and Security Requirements for Use of the Data Encryption Standard in the Physical Layer of Data Communications -- 83 Aug 3
-FIPS 139 facilitates the interoperation of government data communication facilities, systems, and data that require cryptographic protection using the Data Encryption Standard (DES) algorithm. The standard specifies interoperability and security related requirements using encryption at the Physical Layer of the ISO Open Systems Interconnection (OSI) Reference Model (International Standard 7498) in the telecommunications systems conveying Automatic Data Processing (ADP) and/or narrative text information.

140-1 Security Requirements for Cryptographic Modules -- 94 Jan 11
- Provides the security requirements that are to be satisfied by a cryptographic module implemented within a security system and provides four increasing, qualitative levels of security intended to cover a wide range of potential applications and environments. The security requirements cover basic design and documentation, module interfaces, authorized roles and services, physical security, software security, operating system security, key management, cryptographic algorithms, electromagnetic interference/electromagnetic compatibility (EMI/EMC), and self-testing.

141 Interoperability and Security Requirements for Use of the Data Encryption Standard with CCITT Group 3 Facsimile Equipment -- 85 Apr 04
- FIPS 141 specifies interoperability and security related requirements for use of encryption with the International Telegraph and Telephone Consultative Committee (CCITT) Group 3-type facsimile equipment conveying Automatic Data Processing (ADP) and/or narrative text information.

144 Data Communication Systems and Services User- Oriented Performance Parameters (ANSI X3.102-1983/R1990) -- 85 May 28
- Improves Federal government procurement of digital telecommunications systems and services by providing user-oriented and system independent means of specifying communication performance. Adopts ANSI X3.102-1983/R1990.

150 Facsimile Coding Schemes and Coding Control Functions for Group 4 Facsimile Apparatus (EIA-538-1988) -- 88 Nov 04
- FIPS 150 defines the facsimile coding schemes and their control functions for Group 4 facsimile apparatus. The standard adopts EIA-RS-538.

151-2 Portable Operating System Interface (POSIX) System Application Program Interface [C Language] (ISO/IEC 9945-1:1990) -- 93 May 12
- POSIX is for use by computing professionals involved in system and application software development and implementation. Adopts ISO/IEC 9945-1:1990, which defines a C language source interface to an operating system environment.

155 Data Communication Systems and Services User- Oriented Performance Measurement Methods (ANSI X3.141-1987) -- 88 Nov 04
-Specifies uniform methods of measuring the performance of data communication services at digital interfaces between data communication systems and their users. These methods may be used to characterize the performance of any data communication service in accordance with the user-oriented performance parameters defined in a companion standard, American National Standard X3.102-1983, which has been adopted as FIPS 144. Adopts ANSI X3.141-1987.

160 C (ANSI/ISO 9899:1992) -- 91 Mar 13
-Specifies the form and establishes the interpretation of programs written in the C programming language. Adopts ANSI/ISO 9899:1992 (replaces ANSI X3.159-1989).

161-2 Electronic Data Interchange (EDI) -- 96 May 22
- FIPS 161-2 adopts, with specific conditions, the families of EDI standards known as X12, UN/EDIFACT and HL7 developed by national and international standards developing organizations. FIPS 161-2 does not mandate the implementation of EDI systems within the Federal government, but requires the use of the identified families of standards when Federal agencies and organizations implement EDI systems.

162 1,200 Bits Per Second Two-Wire Duplex Modems for Data Communications Use on Telephone-Type Circuits -- 92 April 2 (Supersedes FIPS PUB 136/Former Federal Standard 1008)
-Adopts CCITT Recommendation V.22 for equipment or services that utilize 600 and/or 1,200 bit/s two-wire duplex modems to facilitate interoperability between telecommunications facilities of the Federal government.

163 2,400 Bits Per Second Two-Wire Duplex Modems for Data Communications Use on Telephone-Type Circuits -- 92 April 2 (Supersedes FIPS PUB 133/Former Federal Standard 1005A)
-Adopts CCITT Recommendation V.22 bis for equipment and services that utilize 2,400 bit/s two-wire duplex modems to facilitate interoperability between telecommunications facilities of the Federal government.

164 2,400 Bits Per Second Four-Wire Duplex and Two-Wire Half-Duplex Modems for Data Communications Use on Telephone-Type Circuits -- 92 April 2 (Supersedes FIPS PUB 133/Former Federal Standard 1005A)
- Adopts CCITT Recommendation V.26 for equipment and services that utilize 2,400 bit/s four-wire duplex and/or two-wire half-duplex modems to facilitate interoperability between telecommunications facilities of the Federal government.

165 4,800 Bits Per Second Four-Wire Duplex and Two-Wire Half-Duplex Modems for Data Communications Use on Telephone-Type Circuits -- 92 April 2 (Supersedes FIPS PUB 134-1/Former Federal Standard 1006A)
- Adopts CCITT Recommendation V.27 bis and V.27 ter equipment and services that utilize 4,800 bit/s four-wire duplex and/or two-wire half-duplex modems to facilitate interoperability between telecommunications facilities of the Federal government.

166 4,800 and 9,600 Bits Per Second Two-Wire Duplex Modems for Data Communications Use on Telephone-Type Circuits -- 92 April 2 (Supersedes FIPS PUB 134-1/Former Federal Standard 1006A)
- Adopts CCITT Recommendation V.32 for equipment and services that utilize 4,800 and/or 9,600 bit/s two-wire duplex modems to facilitate interoperability between telecommunications facilities of the Federal government.

167 9,600 Bits Per Second Four-Wire Duplex Modems for Data Communications Use on Telephone-Type Circuits -- 92 April 2 (Supersedes FIPS PUB 135/Former Federal Standard 1007)
-Adopts CCITT Recommendation V.29 for equipment and services that utilize 9,600bit/s four-wire duplex modems to facilitate interoperability between telecommunications facilities of the Federal government.

168 12,000 and 14,400 Bits Per Second Four-Wire Duplex Modems for Data Communications Use on Telephone-Type Circuits -- 92 April 2
-Adopts CCITT Recommendation V.33 for equipment and services utilizing 12,000 and/or 14,000 bit/s four-wire duplex modems to facilitate interoperability between telecommunications facilities of the Federal government.

169 Error Correction in Modems Employing Asynchronous- To-Synchronous Conversion -- 92 Apr 2
-Adopts CCITT Recommendation V.42 for equipment and services that utilize error correction in modems employing asynchronous-to-synchronous conversion to facilitate interoperability between telecommunications facilities of the Federal government.

170 Data Compression in Modems Employing CCITT Recommendation V.42 Error Correction -- 92 Apr 2
-Adopts CCITT Recommendation V.42 bis for equipment and services that utilize data compression in modems employing data compression obtained by substituting strings of characters by reduced length codes at a transmitting modem and replacing the transmitted codes by the original strings of characters at a receiving modem. Standard facilitates interoperability between telecommunications facilities of the Federal government.

171 Key Management Using ANSI X9.17 (ANSI X9.17-1985) -- 92 Apr 27
-Specifies a particular selection of options for the automated distribution of keying material by the Federal Government when using the protocols of ANSI X9.17-1985. ANSI X9.17-1985 defines procedures for the manual and automated management of keying materials and utilizes the Data Encryption Standard to provide key management for a variety of operational environments.

172-1 VHSIC Hardware Description Language (VHDL) (ANSI/IEEE 1076-1993) -- 95 Jan 27
-Specifies the form and establishes the interpretation of programs expressed in VHDL for use on a variety of data processing systems. Adopts ANSI/IEEE 1076-1993.

173-1 Spatial Data Transfer Standard (SDTS)(DOI/USGS Specs.) -- 94 June 10
-Provides specifications for the organization and structure of digital spatial data transfer, definition of spatial features and attributes, data transfer encoding and a topological vector profile (TVP). The purpose of this standard is to promote and facilitate the transfer of digital spatial data between dissimilar computer systems.

175 Federal Building Standard for Telecommunications Path ways and Spaces (ANSI/EIA/TIA-569-1990) -- 92 Aug 21
-Specifies minimum requirements for the design and construction of rooms, areas and pathways into which and through which telecommunications equipment and media are to be installed within a building and between buildings in a campus environment. Adopts ANSI/EIA/TIA-569-1990.

176 Residential and Light Commercial Telecommunications Wiring Standard (ANSI/EIA/TIA-570-1991) -- 92 Aug 21
-Specifies minimum requirements for telecommunications wiring for connecting one to four exchange access lines to various types of customer premises equipment in small buildings. Adopts ANSI/EIA/TIA-570-1991. This standard is complementary to FIPS 174, which addresses large building sites.

180-1 Secure Hash Standard (SHS) -- 95 Apr 17
- To specify a Secure Hash Algorithm to be used by both the transmitter and intended receiver of a message in computing and verifying a digital signature.

181 Automated Password Generator (APG) -- 93 Oct 05
-Specifies a standard to be used by Federal organizations that require computer generated pronounceable passwords to authenticate the personal identity of an automated data processing (ADP) system user, and to authorize access to system resources. The standard describes an automated password generation algorithm that randomly creates simple pronounceable syllables as passwords. The password generator accepts input from a random number generator based on the Data Encryption Standard (DES) cryptographic algorithm defined in Federal Information Processing Standard 46-2.

182 Integrated Services Digital Network (ISDN) -- 93 Oct 05
-Defines the generic protocols necessary to establish transparent Integrated Services Digital Network (ISDN) connection among government networks and between government and conformant common carrier networks. This standard provides a minimal set of bearer services, and is based on national standards, international standards, and implementation agreements developed by the North American ISDN Users' Forum (NIUF).

183 Integration Definition for Function Modeling (IDEFO) -- 93 Dec 21
- Describes the IDEF0 modeling language (semantics and syntax), and associated rules and techniques, for developing structured graphical representations of a system or enterprise. Use of this standard permits the construction of models comprising system functions (activities, actions, processes, operations), functional relationships, and data (information or objects) that support systems integration.

184 Integration Definition for Information Modeling (IDEFIX) -- 93 Dec 21
- Describes the IDEF1X modeling language (semantics and syntax), and associated rules and techniques, for developing a logical model of data. IDEF1X is used to produce a graphical information model which represents the structure and semantics of information within an environment or system. Use of this standard permits the construction of semantic data models which may serve to support the management of data as a resource, the integration of information systems, and the building of computer databases.

185 Escrowed Encryption Standard (EES) -- 94 Feb 09
-This non-mandatory standard provides an encryption/decryption algorithm and a Law Enforcement Access Field (LEAF) creation method which may be implemented in electronic devices and may be used at the option of government agencies to protect government telecommunications. The algorithm and the LEAF creation method are classified and are referenced, but not specified, in the standard. Electronic devices implementing this standard may be designed into cryptographic modules which are integrated into data security products and systems for use in data security applications. The LEAF is used in a key escrow system that provides for decryption of telecommunications when access to the telecommunications is lawfully authorized.

186-1 Digital Signature Standard (DSS) -- 98 December 15
-This standard is an interim final standard that was approved by the Secretary of Commerce (Federal Register, December 15, 1998). The DSS provides the capability of generating and verifying digital signatures for applications requiring a digital rather than a written signature. The change allows for the use of the Digital Signature Algorithm (DSA) as specified by American National Standards Institute (ANSI) X9.30 and the Rivest-Shamir-Adleman (RSA) digital signature technique as specified by ANSI X9.31. This interim final standard is undergoing final review and approval.

187 Administration Standard for the Telecommunications Infrastructure of Federal Buildings (ANSI/TIA/EIA-606-1993) -- 94 Aug 11
- Specifies the administrative requirements of the telecommunications infrastructure within a new, existing, or renovated office building or campus. Adopts ANSI/TIA/EIA-606-1993

188 Standard Security Label for Information Transfer -- 94 Sept 6
-Defines a security label syntax for information exchanged over data networks and provides label encodings for use at the Application and Network Layers. ANSI/TIA/EIA-606-1993

189 Portable Operating System Interface (POSIX)Part 2: Shell and Utilities (ISO/IEC 9945-2:1993) -- 94 Oct 11
-Defines a command language interpreter (shell) and a set of utility programs. Addresses the Applications Portability Profile functional area that deals with methods by which a person interacts with the operating system. Adopts ISO/IEC 9945-2:1993.

190 Guideline for the Use of Advanced Authentication Technology Alternatives -- 94 Sept 28
-Describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations to Federal agencies and departments for the acquisition and use of technology which supports these methods.

191 Guideline for the Analysis of Local Area Network Security -- 94 Nov 9
- Discusses threats and vulnerabilities and considers technical security services and security mechanisms.


192
Application Profile for the Government Information Locator Service (GILS) -- 94 Dec 7
- Describes an application profile for the GILS, which is based primarily on ANSI/NISO Z39.50-1992. GILS is a decentralized collection of servers and associated information services that will be used by the public either directly or through intermediaries to find public information throughout the Federal government.

192-1
(a)& (b)
Application Profile for the Government Information Locator Service (GILS) -- 97 Aug 1
- Describes the United States Federal government use of the international application profile for the GILS, also known as the Global Information Locator Service. The GILS Profile is based primarily on ISO 23950, presently equivalent to the ANSI/NISO Z39.50-1995/Version 2. GILS is a decentralized collection of servers and associated information services that will be used by the public either directly or through intermediaries to find public information throughout the Federal government.

193 SQL Environments -- 95 Feb 3
- A non-mandatory standard that defines conformance profiles that can be used by both vendors and users to specify exact requirements for how various products fit into an SQL environment.

194 Open Document Architecture (ODA) Raster Document Application Profile (DAP) (ISO/IEC 12064-1 ISP/FOD112) -- 95 Mar 13
- To provide specifications for defining a subset of the ODA standard to be used for the interchange of images among raster graphics applications. Facilitates the interchange of raster documents among different raster graphics applications by specifying the constraints on document structure and content according to the rules of the ODA standard. Adopts ISO/IEC 12064-1 ISP/FOD112, which specifies the use of a subset of the ODA standard.

195 Federal Building Grounding and Bonding Requirements for Telecommunications (ANSI/TIA/EIA-607-1994) -- 1995 Aug 15
- To facilitate the planning, design, and installation of telecommunications grounding systems within a Federal government building with or without prior knowledge of the telecommunications systems that will subsequently be installed. Adopts ANSI/TIA/EIA 607-1994.

196 Entity Authentication Using Public Key Cryptography -- 1997 Feb 18
- Specifies two challenge-response protocols by which entitites in a computer system may authenticate their identities to one another. These protocols may be used during session initiation, and at any other time that entity authentication is necessary. Depending on which protocol is implemented, either one or both entities involved may be authenticated. The defined protocols are derived from an international standard for entity authentication based on public key cryptography, which uses digital signatures and random number challenges.


TO TOP

ITL HOME FIPS HOME NIST HOME