NIST logo

Publication Citation: Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance

NIST Authors in Bold

Author(s): Elaine B. Barker; William E. Burr; Alicia Clay Jones; William T. Polk; Scott W. Rose; Miles E. Smid; Quynh H. Dang;
Title: Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Published: December 28, 2009
Abstract: [Superseded by: SP 800-57 Part 3 Rev. 1 (January 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917445] Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
Citation: NIST SP - 800-57 Pt3
Pages: 107 pp.
Keywords: accreditation; assurances; authentication; authorization; availability; backup; certification; compromise; confidentiality; cryptanalysis; cryptographic key; cryptographic module; digital signature; key management; key management policy; key recovery; private key; public key; public key infrastructure; security plan; trust anchor; validation.
Research Areas: Information Technology, Computer Security, Cybersecurity