Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publication Citation: Recommendation for Key Management - Part 1: General (Revision 3)

NIST Authors in Bold

Author(s): Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid;
Title: Recommendation for Key Management - Part 1: General (Revision 3)
Published: July 10, 2012
Abstract: [Superseded by SP 800-57 Part 1 Revision 4 (January 2016): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919831]This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides background information regarding the cryptographic algorithms that use cryptographic keying material; 3) classifies the different types of keys and other cryptographic information according to their functions, specifies the protection that each type of information requires and identifies methods for providing this protection; 4) identifies the states in which a cryptographic key may exist during its lifetime; 5)identifies the multitude of functions involved in key management; and 6) discusses a variety of key management issues related to the keying material. [Supersedes SP 800-57 Part 1 (Revised) (March 2007): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917473]
Citation: Special Publication (NIST SP) - 800-57 Pt1 Rev 3
Pages: 147 pp.
Keywords: archive, assurances, authentication, authorization, availability, backup, compromise, confidentiality, cryptanalysis, cryptographic key, cryptographic module, digital signature, hash function, key agreement, key management, key management policy, key recovery, key transport, originator-usage period, private key, public key, recipient-usage period, secret key, split knowledge, trust anchor.
Research Areas: Computer Security, Cybersecurity
DOI: http://dx.doi.org/10.6028/NIST.SP.800-57p1r3