SP 800-56C Rev. 2 |
Recommendation for Key-Derivation Methods in Key-Establishment Schemes |
Final |
08/18/2020 |
SP 800-133 Rev. 2 |
Recommendation for Cryptographic Key Generation |
Final |
06/04/2020 |
SP 800-57 Part 1 Rev. 5 |
Recommendation for Key Management: Part 1 – General |
Final |
05/04/2020 |
SP 800-56C Rev. 2 (Draft) |
Recommendation for Key-Derivation Methods in Key-Establishment Schemes |
Draft |
03/24/2020 |
SP 800-57 Part 1 Rev. 5 (Draft) |
Recommendation for Key Management: Part 1 – General |
Draft |
10/08/2019 |
SP 800-133 Rev. 1 |
Recommendation for Cryptographic Key Generation |
Withdrawn |
07/23/2019 |
SP 800-57 Part 2 Rev. 1 |
Recommendation for Key Management: Part 2 – Best Practices for Key Management Organizations |
Final |
05/23/2019 |
SP 800-131A Rev. 2 |
Transitioning the Use of Cryptographic Algorithms and Key Lengths |
Final |
03/21/2019 |
SP 800-56B Rev. 2 |
Recommendation for Pair-Wise Key-Establishment Using Integer Factorization Cryptography |
Final |
03/21/2019 |
SP 800-56A Rev. 3 |
Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography |
Final |
04/16/2018 |
SP 800-56C Rev. 1 |
Recommendation for Key-Derivation Methods in Key-Establishment Schemes |
Withdrawn |
04/16/2018 |
SP 800-57 Part 1 Rev. 4 |
Recommendation for Key Management, Part 1: General |
Withdrawn |
01/28/2016 |
SP 800-152 |
A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS) |
Final |
10/28/2015 |
SP 800-57 Part 3 Rev. 1 |
Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance |
Final |
01/22/2015 |
ITL Bulletin |
A Profile of the Key Management Framework for the Federal Government |
Final |
01/09/2014 |
SP 800-130 |
A Framework for Designing Cryptographic Key Management Systems |
Final |
08/15/2013 |
White Paper |
Summary of the Workshop on Cryptographic Key Management Systems (CKMS), National Institute of Standards and Technology, September 10-11, 2012 |
Final |
01/10/2013 |
SP 800-133 |
Recommendation for Cryptographic Key Generation |
Withdrawn |
12/21/2012 |
ITL Bulletin |
Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information |
Final |
12/19/2012 |
SP 800-38F |
Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping |
Final |
12/13/2012 |
SP 800-135 Rev. 1 |
Recommendation for Existing Application-Specific Key Derivation Functions |
Final |
12/23/2011 |
SP 800-132 |
Recommendation for Password-Based Key Derivation: Part 1: Storage Applications |
Final |
12/22/2010 |
NISTIR 7609 |
Cryptographic Key Management Workshop Summary -- June 8-9, 2009 |
Final |
01/08/2010 |
SP 800-108 |
Recommendation for Key Derivation Using Pseudorandom Functions (Revised) |
Final |
10/01/2009 |
SP 800-57 Part 2 |
Recommendation for Key Management, Part 2: Best Practices for Key Management Organization |
Withdrawn |
08/25/2005 |