Computer Security Resource Center   nistlogo
Home Library Services Events Advisories Contact Site Map  
SEARCH


advanced search

Cryptographic Toolkit
 Guidance
 Encryption
 Modes of Operation
 Digital Signatures
 Secure Hashing
 Key Management
 RNG
 Message Authentication
 Entity Authentication

 Passwords

Project Sites
CMVP
PKI
Common Criteria
NIAP
Security Practices

Publications
 
 

Cryptographic Toolkit Header

Key Management

Generally-speaking, there are two types of key management techniques: 1) public key-based, and 2) secret key-based. Currently, there are no FIPS-approved public key-based techniques, and there exists one (1) FIPS-approved* secret key-based technique, specified in FIPS 171, Key Management Using ANSI X9.17.

Public Key-Based
Key Management

NIST has developed a white paper that discusses our plans for developing standards and recommendations for public key-based key management. This will be a two-part process, involving the development of 1) a scheme definition document, and 2) a key management guideline.

Key Management Using Public Key Cryptography was a public workshop held at NIST on February 10-11, 2000 to discuss the development of a FIPS for public key-based key management.
NIST announced plans to develop a public key-based key management FIPS in May 1997, and received numerous comments from the public.

Secret Key-Based
Key Management

FIPS 171, Key Management Using ANSI X9.17, April 27, 1992.

ANSI X9.17 defined procedures for the manual and automated management of keying materials, using secret-key (symmetric) cryptography. FIPS 171 points to X9.17 and specifies which options are mandatory, optional, or forbidden. Note that ANSI X9.17 has recently been withdrawn as a standard in the financial community.

Testing / Products

Testing is not available for key management techniques.

Future Plans

NIST is considering what action to take with FIPS 171, since X9.17 has been withdrawn by ANSI.

Cryptographic Toolkit Return to crypto toolkit page

 

* NIST cryptographic standards are specified in Federal Information Processing Standards (FIPS) Publications. The term "FIPS-approved" indicates something (e.g., a cryptographic algorithm) that is either a) specified in a FIPS or b) adopted in a FIPS and specified either in an appendix to the FIPS or in a document referenced by the FIPS.