Recommendation for Cryptographic Key Generation

Published: December 21, 2012

Author(s)

Elaine B. Barker, Allen L. Roginsky

Abstract

Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.
Citation: Special Publication (NIST SP) - 800-133
Report Number:
800-133
Pub Type: NIST Pubs

Download Paper

Keywords

asymmetric key, key agreement, key derivation, key generation, key wrapping, key replacement, key transport, key update, private key, public key, symmetric key
Created December 21, 2012, Updated February 19, 2017