Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Shirley M. Radack;|
|Title:||Secure Management of Keys in Cryptographic Applications: Guidance for Organizations|
|Published:||February 24, 2010|
|Abstract:||This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing guidance on the management of keys and the selection of cryptographic features of currently available applications and systems. Part 3 focuses on helping system installers and system administrators select and use currently available key management infrastructures, protocols, and applications. It recommends secure combinations of algorithm suites, key sizes and other related options, and discusses the implementation issues that impact the security effectiveness of an organization s key management processes. The bulletin discusses the currently available key management infrastructures, protocols and applications that are presented in Part 3.|
|Keywords:||authentication, authorization, availability, certification, confidentiality, cryptographic key, cryptographic module, cryptography, data integrity, digital signature, encryption, information security, information systems security, key management, private key, public key, public key infrastructure, security plan, validation|
|Research Areas:||Information Technology, Computer Security, Cybersecurity|
|PDF version:||Click here to retrieve PDF version of paper (44KB)|