NIST logo

Publication Citation: Secure Management of Keys in Cryptographic Applications: Guidance for Organizations

NIST Authors in Bold

Author(s): Shirley M. Radack;
Title: Secure Management of Keys in Cryptographic Applications: Guidance for Organizations
Published: February 24, 2010
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing guidance on the management of keys and the selection of cryptographic features of currently available applications and systems. Part 3 focuses on helping system installers and system administrators select and use currently available key management infrastructures, protocols, and applications. It recommends secure combinations of algorithm suites, key sizes and other related options, and discusses the implementation issues that impact the security effectiveness of an organization s key management processes. The bulletin discusses the currently available key management infrastructures, protocols and applications that are presented in Part 3.
Citation: ITLB -
Pages: 7 pp.
Keywords: authentication; authorization; availability; certification; confidentiality; cryptographic key; cryptographic module; cryptography; data integrity; digital signature; encryption; information security; information systems security; key management; private key; public key; public key infrastructure; security plan; validation
Research Areas: Information Technology, Computer Security, Cybersecurity
PDF version: PDF Document Click here to retrieve PDF version of paper (44KB)