Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid;|
|Title:||Recommendation for Key Management - Part 1: General (Revision 3)|
|Published:||July 10, 2012|
|Abstract:||[Superseded by SP 800-57 Part 1 Revision 4 (January 2016): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919831]This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides background information regarding the cryptographic algorithms that use cryptographic keying material; 3) classifies the different types of keys and other cryptographic information according to their functions, specifies the protection that each type of information requires and identifies methods for providing this protection; 4) identifies the states in which a cryptographic key may exist during its lifetime; 5)identifies the multitude of functions involved in key management; and 6) discusses a variety of key management issues related to the keying material. [Supersedes SP 800-57 Part 1 (Revised) (March 2007): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917473]|
|Citation:||Special Publication (NIST SP) - 800-57 Pt1 Rev 3|
|Keywords:||archive, assurances, authentication, authorization, availability, backup, compromise, confidentiality, cryptanalysis, cryptographic key, cryptographic module, digital signature, hash function, key agreement, key management, key management policy, key recovery, key transport, originator-usage period, private key, public key, recipient-usage period, secret key, split knowledge, trust anchor.|
|Research Areas:||Computer Security, Cybersecurity|