Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Elaine B. Barker; William E. Burr; Alicia Clay Jones; William T. Polk; Scott W. Rose; Miles E. Smid; Quynh H. Dang;|
|Title:||Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance|
|Published:||December 28, 2009|
|Abstract:||[Superseded by: SP 800-57 Part 3 Rev. 1 (January 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917445] Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.|
|Citation:||Special Publication (NIST SP) - 800-57 Pt3|
|Keywords:||accreditation, assurances, authentication, authorization, availability, backup, certification, compromise, confidentiality, cryptanalysis, cryptographic key, cryptographic module, digital signature, key management, key management policy, key recovery, private key, public key, public key infrastructure, security plan, trust anchor, validation.|
|Research Areas:||Information Technology, Computer Security, Cybersecurity|