Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Elaine B. Barker; Allen L. Roginsky;|
|Title:||Recommendation for Cryptographic Key Generation|
|Published:||December 21, 2012|
|Abstract:||Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.|
|Citation:||Special Publication (NIST SP) - 800-133|
|Keywords:||asymmetric key, key agreement, key derivation, key generation, key wrapping, key replacement, key transport, key update, private key, public key, symmetric key|
|Research Areas:||Computer Security|