Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Published

Author(s)

Elaine B. Barker, Allen L. Roginsky

Abstract

At the start of the 21st century, the National Institute of Standards and Technology (NIST) began the task of providing cryptographic key management guidance, which includes defining and implementing appropriate key management procedures, using algorithms that adequately protect sensitive information, and planning ahead for possible changes in the use of cryptography because of algorithm breaks or the availability of more powerful computing techniques. NIST Special Publication (SP) 800-57, Part 1 was the first document produced in this effort, and includes a general approach for transitioning from one algorithm or key length to another. This Recommendation (SP 800-131A) provides more specific guidance for transitions to the use of stronger cryptographic keys and more robust algorithms. [Supersedes SP 800-131A (January 2011): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907517]
Citation
Special Publication (NIST SP) - 800-131A Rev 1
Report Number
800-131A Rev 1

Keywords

cryptographic algorithm, digital signatures, encryption, hash function, key agreement, key derivation functions, key management, key transport, key wrapping, message authentication codes, random number generation, security strength, transition
Created November 6, 2015, Updated November 10, 2018