NIST logo

Publication Citation: Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance

NIST Authors in Bold

Author(s): Elaine B. Barker; William E. Burr; Alicia Clay Jones; William T. Polk; Scott W. Rose; Miles E. Smid; Quynh H. Dang;
Title: Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance
Published: December 28, 2009
Abstract: [Superseded by: SP 800-57 Part 3 Rev. 1 (January 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917445] Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
Citation: NIST SP - 800-57 Pt3
Pages: 107 pp.
Keywords: accreditation, assurances, authentication, authorization, availability, backup, certification, compromise, confidentiality, cryptanalysis, cryptographic key, cryptographic module, digital signature, key management, key management policy, key recovery, private key, public key, public key infrastructure, security plan, trust anchor, validation.
Research Areas: Information Technology, Computer Security, Cybersecurity