Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publication Citation: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

NIST Authors in Bold

Author(s): Elaine B. Barker; Allen L. Roginsky;
Title: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
Published: January 13, 2011
Abstract: [Superseded by SP 800-131A Revision 1 (November 2015): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919563] At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algorithms that adequately protect sensitive information, and planning ahead for possible changes in the use of cryptography because of algorithm breaks or the availability of more powerful computing techniques. NIST Special Publication (SP) 800-57, Part 1 was the first document produced in this effort, and includes a general approach for transitioning from one algorithm or key length to another. This Recommendation (SP 800-131A) provides more specific guidance for transitions to the use of stronger cryptographic keys and more robust algorithms.
Citation: Special Publication (NIST SP) - 800-131A
Pages: 27 pp.
Keywords: Cryptographic algorithm, digital signatures, encryption, hash function, key agreement, key derivation, key management, key transport, key wrapping, message authentication codes, random number generation, security strength, transition
Research Areas: Computer Security
DOI: http://dx.doi.org/10.6028/NIST.SP.800-131A