Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Cryptographic Key Management Workshop 2012

NIST conducted a two-day Key Management Workshop on September 10-11. The subject of the workshop was the technical and administrative aspects of Cryptographic Key Management Systems (CKMSs) that existed at the time and what would be required for U.S. Federal use in the future. On the first day, DRAFT NIST Special Publication 800-130 ("A Framework for Designing CKMS") and DRAFT NIST Special Publication 800-152 ("A Profile for U.S. Federal CKMS") were reviewed and comments were solicited from the workshop participants on the DRAFT documents. The second day focused on CKMS capabilities in future security products and services in new U.S. Federal Information Systems. Input from Workshop participants was solicited regarding the utility and feasibility of these capabilities as well as suggestions for other technical capabilities required in future CKMSs.

*NEW!* Summary of the Workshop on Cryptographic Key Management Systems

 


Webcast

The event was webcast live September 10 and 11. The link to the webcast is no longer available.  

 


Related:  Cryptographic Key Management Project

Reference Documentation: Copies of NIST SP 800-130 and NIST SP 800-152 will not be available at the workshop. If you'd like to reference either document while at the workshop, please print a copy to bring along. 

 

 

Monday, September 10, 2012

9:00am - 9:15am

Welcome and administrative information – Elaine Barker, NIST

9:15am - 10:00amKey Management in Historical PerspectiveWhitfield Diffie
10:00am - 11:15amReview NIST SP 800-130 goals, audience, anticipated benefits and potential impacts; summarize CKMS design requirements and how they can be satisfiedMiles Smid, NIST Guest Researcher
11:15am - 11:35amBreak
11:35am - 12:00pmDiscussion of NIST SP 800-130, participant recommendations for improving the document, CKMS and domain security policies, CKMS market forcesMiles Smid, NIST Guest Researcher
12:00pm - 12:30pmNIST SP 800-130 to Evaluate Existing SystemsTony Stieber
12:30pm - 1:30pmLunch
1:30pm - 2:00pmReview the NIST SP 800-152 goals, its intended audience and scope, the differences between the Framework and the Profile, and their anticipated uses– Elaine Barker, NIST
2:00pm - 3:00pmDiscuss the draft requirements for NIST SP 800-152 – Elaine Barker, Miles Smid, Dennis Branstad
3:00pm - 3:30pmBreak
3:30pm - 5:00pmDiscussion of NIST SP 800-152 requirements (continued) – Elaine Barker, Miles Smid, Dennis Branstad

 

 

Tuesday, September 11, 2012

 Moderator: Bill Newhouse, NIST
9:00am - 9:30am

Welcome and Leap-ahead Inspirational TalkTim Polk, NIST

9:30am - 10:00amSecurity Policies as a Foundation for Cryptographic Key ManagementDennis Branstad, NIST Guest Researcher
10:00am - 10:30amHow to Balance Privacy and Key Management in User AuthenticationAnna Lysyanskaya, Brown University
10:30am - 11:00amBreak
11:00am - 11:30amKey Centric Identity and Privilege ManagementPaul Lambert, Marvell
11:30am - 12:00pmWireless/Mobile ApplicationsLily Chen, NIST
12:00pm - 12:30pmSecurely Managing Cryptographic Keys used within a Cloud EnvironmentSarbari Gupta, Electrosoft
12:30pm - 1:30pmLunch
1:30pm - 2:00pmRandom Bit Generation Using SP 800-90Elaine Barker, NIST
2:00pm - 2:30pmSecure Key Storage and True Random Number Generation – An Overview - Rene Struik, Struik Security Consultancy
2:30pm - 3:00pmDesigning Key Management with Usability in MindMary Theofanos, NIST
3:00pm - 3:30pmBreak
3:30pm - 4:15pmPanel: Cross-Domain Interactions: Scenarios and SolutionsBob Griffin, RSA; John Leiseboer, Quintessence Labs; and Saikat Saha, SafeNet
4:15pm - 4:45pmKey Management Challenges of Derived Credentials and Techniques for Addressing ThemFrancisco Corella, Pomcor
4:45pm - 5:00pmWorkshop Wrap-Up - Tim Polk, NIST


Call for Presentations

During the development of SP 800-130 (the Key Management Framework) and SP 800-152 (the Profile document), NIST identified a number of properties as particularly hard problems associated with secure Cryptographic Key Management Systems (CKMS). These problems include:

- Cryptographic
- Agility
- Scalability
- Anonymity
- Unlinkability
- Unobservability
- Usability
- Compromise recovery
- Multi-level security domains
- Negotiating and enforcing domain security policies, including a  Policy Language for enabling negotiation and enforcement
- Interaction between domains, each with its own security policies

The second day of the workshop will focus on these and other hard problems. NIST requests the submission of abstracts for presentation about these and other problems associated with key management systems. These submissions should be no longer than two paragraphs in length and should be submitted to kmwquestions [at] nist.gov?subject=SUBMISSION: CKMW Call for Presentations">kmwquestions [at] nist.gov by August 6th.

Created July 2, 2012, Updated June 22, 2017