Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Recommendation for Key Management - Part 1: General (Revision 3)

Published

Author(s)

Elaine B. Barker, William C. Barker, William E. Burr, William T. Polk, Miles E. Smid

Abstract

[Superseded by SP 800-57 Part 1 Revision 4 (January 2016): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919831]This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides background information regarding the cryptographic algorithms that use cryptographic keying material; 3) classifies the different types of keys and other cryptographic information according to their functions, specifies the protection that each type of information requires and identifies methods for providing this protection; 4) identifies the states in which a cryptographic key may exist during its lifetime; 5)identifies the multitude of functions involved in key management; and 6) discusses a variety of key management issues related to the keying material. [Supersedes SP 800-57 Part 1 (Revised) (March 2007): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917473]
Citation
Special Publication (NIST SP) - 800-57 Pt1 Rev 3
Report Number
800-57 Pt1 Rev 3

Keywords

archive, assurances, authentication, authorization, availability, backup, compromise, confidentiality, cryptanalysis, cryptographic key, cryptographic module, digital signature, hash function, key agreement, key management, key management policy, key recovery, key transport, originator-usage period, private key, public key, recipient-usage period, secret key, split knowledge, trust anchor.

Citation

Barker, E. , Barker, W. , Burr, W. , Polk, W. and Smid, M. (2012), Recommendation for Key Management - Part 1: General (Revision 3), Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.SP.800-57p1r3 (Accessed March 28, 2024)
Created July 10, 2012, Updated November 10, 2018