Projects Key Management
Key Management
Project Overview
Publications that discuss the generation, establishment, storage, use and destruction of the keys used NIST’s cryptographic algorithms
Project Areas:
Generally-speaking, there are two types of key establishment techniques: 1) techniques based on asymmetric (public key) algorithms, and 2) techniques based on symmetric (secret key) algorithms. However, hybrid techniques are also commonly used, whereby public key techniques are used to establish symmetric (secret) key encryption keys, which are then used to establish other symmetric (secret) keys.
Implementation-related References
Created January 04, 2017, Updated November 20, 2018