NIST logo

Publication Citation: Recommendation for Key Management - Part 1: General (Revision 3)

NIST Authors in Bold

Author(s): Elaine B. Barker; William C. Barker; William E. Burr; William T. Polk; Miles E. Smid;
Title: Recommendation for Key Management - Part 1: General (Revision 3)
Published: July 10, 2012
Abstract: This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides background information regarding the cryptographic algorithms that use cryptographic keying material; 3) classifies the different types of keys and other cryptographic information according to their functions, specifies the protection that each type of information requires and identifies methods for providing this protection; 4) identifies the states in which a cryptographic key may exist during its lifetime; 5)identifies the multitude of functions involved in key management; and 6) discusses a variety of key management issues related to the keying material. [Supersedes SP 800-57 Part 1 (Revised) (March 2007):]
Citation: NIST SP - 800-57 Pt1 Rev 3
Pages: 147 pp.
Keywords: archive; assurances; authentication; authorization; availability; backup; compromise; confidentiality; cryptanalysis; cryptographic key; cryptographic module; digital signature; hash function; key agreement; key management; key management policy; key recovery; key transport; originator-usage period; private key; public key; recipient-usage period; secret key; split knowledge; trust anchor.
Research Areas: Computer Security, Cybersecurity
PDF version: PDF Document Click here to retrieve PDF version of paper (1MB)