Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Recommendation for Cryptographic Key Generation

Published

Author(s)

Elaine B. Barker, Allen L. Roginsky

Abstract

Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.
Citation
Special Publication (NIST SP) - 800-133 Rev. 1
Report Number
800-133 Rev. 1

Keywords

asymmetric key, key agreement, key derivation, key generation, key wrapping, key replacement, key transport, private key, public key, symmetric key
Created July 23, 2019, Updated July 25, 2019