U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cryptographic key

Abbreviation(s) and Synonym(s):

Key

Definition(s):

  A parameter used in conjunction with a cryptographic algorithm that determines its operation. Examples applicable to this Standard include: 1. The computation of a digital signature from data, and 2. The verification of a digital signature.
Source(s):
NIST SP 800-12 Rev. 1 under Key from FIPS 186-4

  A parameter used in conjunction with a cryptographic algorithm that determines the specific operation of that algorithm.
Source(s):
NIST SP 1800-12b under cryptographic key (key)
FIPS 201 [version unknown] under Cryptographic Key (Key)

  A parameter used in conjunction with a cryptographic algorithm that determines its operation. Examples applicable to this Recommendation include: 1. The computation of a digital signature from data, and 2. The verification of a digital signature.
Source(s):
NIST SP 800-102 under Key

  A parameter used with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples applicable to this Recommendation include: 1. The computation of a keyed-hash message authentication code. 2. The verification of a keyed-hash message authentication code. 3. The generation of a digital signature on a message. 4. The verification of a digital signature.
Source(s):
NIST SP 800-107 Rev. 1 under Key

  A  binary  string  used  as  a  secret  parameter  by  a  cryptographic algorithm. In this Recommendation, a cryptographic key shall be either a truly random binary string of a length specified by the cryptographic algorithm or a pseudorandom binary string of the specified length that is computationally indistinguishable from one selected uniformly at random from the set of all binary strings of that length.
Source(s):
NIST SP 800-108 under Cryptographic key

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples of cryptographic operations requiring the use of cryptographic keys include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received authentication code, 7. The computation of a shared secret that is used to derive keying material. 8. The derivation of additional keying material from a key-derivation key (i.e., a pre-shared key).
Source(s):
NIST SP 800-133 [Superseded] under Cryptographic key (key)

  A parameter used in conjunction with a cryptographic algorithm that determines the algorithm’s operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received authentication code.
Source(s):
NIST SP 800-135 Rev. 1 under Cryptographic key (key)

  A parameter that determines the transformation from plaintext to ciphertext and vice versa. (A DEA key is a 64-bit parameter consisting of 56 independent bits and 8 parity bits). Multiple (1, 2 or 3) keys may be used in the Triple Data Encryption Algorithm.
Source(s):
NIST SP 800-20 under Cryptographic key

  A parameter used in the block cipher algorithm that determines the forward cipher operation and the inverse cipher operation.
Source(s):
NIST SP 800-38A under Cryptographic Key

  The parameter of the block cipher that determines the selection of the forward cipher function from the family of permutations.
Source(s):
NIST SP 800-38D under Key

  A parameter used in the block cipher algorithm that determines the forward cipher function.
Source(s):
NIST SP 800-38C under Cryptographic Key

  A parameter used with a cryptographic algorithm that determines its operation.
Source(s):
NIST SP 800-56B Rev. 2 under Cryptographic key (Key)
NIST SP 800-56B Rev. 1 [Superseded] under Cryptographic key (Key)

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples include: • the transformation of plaintext data into ciphertext data, • the transformation of ciphertext data into plaintext data, • the computation of a digital signature from data, • the verification of a digital signature, • the computation of an authentication code from data, • the computation of a shared secret that is used to derive keying material.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Cryptographic key (key)

  A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. For the purposes of these guidelines, key requirements shall meet the minimum requirements stated in Table 2 of NIST SP 800-57 Part 1. See also Asymmetric Keys, Symmetric Key.
Source(s):
NIST SP 800-63-3 under Cryptographic Key

  A parameter that determines the transformation using DEA and TDEA forward and inverse operations.
Source(s):
NIST SP 800-67 Rev. 2 under Cryptographic Key
NIST SP 800-67 Rev. 1 [Superseded] under Cryptographic Key

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce the operation, while an entity without knowledge of the key cannot. Examples of the use of a key that are applicable to this Recommendation include: 1. The computation of a digital signature from data, and 2. The verification of a digital signature.
Source(s):
NIST SP 800-89 under Key

  A parameter that determines the operation of a cryptographic function, such as: 1. The transformation from plaintext to ciphertext and vice versa, 2. The generation of keying material, or 3. A digital signature computation or verification.
Source(s):
NIST SP 800-90A Rev. 1 under Cryptographic Key (Key)

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples include: The transformation of plaintext data inot cipertext data, the transformation of ciphertext into plaintext data, The computation of a digital signautre from data, The verification of a digital signautre, The computation of an authentication code from data, The computation of a shared secret that is used to derive keying material.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Cryptographic key (key)

  See cryptographic key.
Source(s):
NIST SP 800-133 [Superseded] under Key
NIST SP 800-133 Rev.1 [Superseded] under Key
NIST SP 800-20 under Key
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Key
NIST SP 800-67 Rev. 2 under Key
NIST SP 800-90A Rev. 1 under Key
NIST SP 800-175B Rev. 1 under Key
NIST SP 800-57 Part 1 Rev. 5 under Key
NIST SP 800-133 Rev. 2 under Key
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Key
NIST SP 800-67 Rev. 1 [Superseded] under Key

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the correct key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples of cryptographic operations requiring the use of cryptographic keys include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received authentication code, 7. The computation of a shared secret that is used to derive keying material. 8. The derivation of additional keying material from a keyderivation key (i.e., a pre-shared key).
Source(s):
NIST SP 800-133 Rev.1 [Superseded] under Cryptographic key

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce, reverse or verify the operation, while an entity without knowledge of the key cannot. Examples include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature on data, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received authentication code, 7. The computation of a shared secret that is used to derive keying material.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Cryptographic key (key)

  A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. For the purposes of these guidelines, key requirements shall meet the minimum requirements stated in Table 2 of NIST SP 800-57 Part 1. See also Asymmetric Keys, Symmetric Key.
Source(s):
NIST SP 800-63-3 under Cryptographic Key

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation while an entity without knowledge of the key cannot. Examples include 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature, 5. The computation of a message authentication code (MAC) from data, 6. The verification of a MAC received with data, 7. The computation of a shared secret that is used to derive keying material.
Source(s):
NIST SP 800-175B Rev. 1 under Cryptographic key

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce, reverse or verify the operation while an entity without knowledge of the key cannot. Examples include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature on data, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received or retrieved authentication code, and 7. The computation of a shared secret that is used to derive keying material.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Cryptographic key (key)

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the correct key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples of cryptographic operations requiring the use of cryptographic keys include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature, 5. The computation of a message authentication code (MAC) from data, 6. The verification of a MAC from data and a received MAC, 7. The computation of a shared secret that is used to derive keying material, and 8. The derivation of additional keying material from a keyderivation key (e.g., a pre-shared key). The specification of a cryptographic algorithm (as employed in a particular application) typically declares which of its parameters are keys.
Source(s):
NIST SP 800-133 Rev. 2 under Cryptographic key (key)

  A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification.
Source(s):
NIST SP 1800-21B under Cryptographic Key from NIST SP 800-63-3

  A cryptographic key. In this document, keys generally refer to public key cryptography key pairs used for authentication of users and/or machines (using digital signatures). Examples include identity key and authorized keys. The SSH protocol also uses host keys that are used for authenticating SSH servers to SSH clients connecting them.
Source(s):
NISTIR 7966 under Key

  See “Cryptographic Key”.
Source(s):
FIPS 201 [version unknown] under Key

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received authentication code, 7. The computation of a shared secret that is used to derive keying material.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Cryptographic key (key)

  A value used to control cryptographic operations, such as decryption, encryption, signature generation or signature verification. For the purposes of this document, key requirements shall meet the minimum requirements stated in Table 2 of NIST SP 800-57 Part 1. See also Asymmetric keys, Symmetric key.
Source(s):
NIST SP 800-63-2 [Superseded] under Cryptographic Key