NIST logo

Publication Citation: Recommendation for Cryptographic Key Generation

NIST Authors in Bold

Author(s): Elaine B. Barker; Allen L. Roginsky;
Title: Recommendation for Cryptographic Key Generation
Published: December 21, 2012
Abstract: Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.
Citation: NIST SP - 800-133
Keywords: asymmetric key; key agreement; key derivation; key generation; key wrapping; key replacement; key transport; key update; private key; public key; symmetric key
Research Areas: Computer Security
DOI: http://dx.doi.org/10.6028/NIST.SP.800-133