None
A method of encrypting and decrypting keys and (possibly) associated data using a symmetric key; both confidentiality and integrity protection are provided.
Source(s):
NIST SP 800-133
[Superseded]
A method of cryptographically protecting keys using a symmetric key that provides both confidentiality and integrity protection.
Source(s):
NIST SP 800-152
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
NIST SP 800-57 Part 1 Rev. 5
In this Recommendation, key-wrapping is a method of protecting keying material using a symmetric-key-based authenticated encryption method, such as a block cipher key-wrapping mode specified in [NIST SP 800-38F] that provides both confidentiality and integrity protection.
Source(s):
NIST SP 800-56A Rev. 2
under Key-wrapping
[Superseded]
Encrypting a symmetric key using another symmetric key (the key encrypting key). A key used for key wrapping is known as a key encrypting key.
Source(s):
NIST SP 800-57 Part 2
[Superseded]
A method of protecting secret keying material (along with associated integrity information) that provides both confidentiality and integrity protection when using symmetric-key algorithms.
Source(s):
NIST SP 800-56B Rev. 2
A method of providing both confidentiality and integrity protection for keying material using a symmetric key,
Source(s):
NIST SP 800-57 Part 2 Rev.1
A method of encrypting and decrypting keys and (possibly) associated data using symmetric-key cryptography; both confidentiality and integrity protection are provided. See SP 800-38F. 6
Source(s):
NIST SP 800-133 Rev.1
[Superseded]
A method of cryptographically protecting the confidentiality and integrity of keys using a symmetric-key algorithm.
Source(s):
NIST SP 800-175B Rev. 1
A method of protecting keying material (along with associated integrity information) that provides both confidentiality and integrity protection when using a symmetric-key algorithm.
Source(s):
NIST SP 800-56B Rev. 1
[Superseded]
A method of encrypting keys (along with associated integrity information) that provides both confidentiality and integrity protection using a symmetric key.
Source(s):
NIST SP 800-57 Part 1 Rev. 3
[Superseded]