U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

key distribution

Abbreviation(s) and Synonym(s):

Definition(s):

  The transport of a key and other keying material from an entity that either owns or generates the key to another entity that is intended to use the key.
Source(s):
CNSSI 4009-2015 from NIST SP 800-57 Part 1 Rev. 3
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Key distribution
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Key distribution

  A key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver) using an asymmetric algorithm.
Source(s):
NIST SP 800-133 [Superseded] under Key transport

  See Key transport.
Source(s):
NIST SP 800-152 under Key distribution

  A manual or automated key-establishment procedure whereby one entity (the sender) selects and distributes the key to another entity (the receiver).
Source(s):
NIST SP 800-152 under Key transport

  A (pair-wise) key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver). Contrast with key agreement.
Source(s):
NIST SP 800-56B Rev. 2 under Key transport

  A key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver). Contrast with key agreement.
Source(s):
NIST SP 800-175B Rev. 1 under Key transport
NIST SP 800-56B Rev. 1 [Superseded] under Key transport

  The transport of a key and other keying material from an entity that either owns the key or generates the key to another entity that is intended to use the key.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Key distribution

  Secure transport of cryptographic keys from one cryptographic module to another module. When used in conjunction with a public key (asymmetric) algorithm, keying material is encrypted using a public key and subsequently decrypted using a private key. When used in conjunction with a symmetric algorithm, key transport is known as key wrapping.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Key transport

  See Key distribution.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Distribution
NIST SP 800-57 Part 2 [Superseded] under Distribution
NIST SP 800-57 Part 2 Rev.1 under Distribution
NIST SP 800-57 Part 1 Rev. 5 under Distribution
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Distribution

  The transport of key information from one entity (the sender) to one or more other entities (the receivers). The sender may have generated the key information or acquired it from another source as part of a separate process. The key information may be distributed manually or using automated key transport mechanisms.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Key distribution

  A key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver).
Source(s):
NIST SP 800-133 Rev.1 [Superseded] under Key transport
NIST SP 800-133 Rev. 2 under Key transport

  A key-establishment procedure whereby one party (the sender) selects and encrypts (or wraps) the keying material and then distributes the material to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the keying material is encrypted using the public key of the receiver and subsequently decrypted using the private key of the receiver. When used in conjunction with a symmetric algorithm, the keying material is encrypted with a key-wrapping key shared by the two parties.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Key transport

  The transport of a key and other keying material from an entity that either owns, generates or otherwise acquires the key to another entity that is intended to use the key.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Key distribution

  A key-establishment procedure whereby one party (the sender) selects and encrypts (or wraps) the key and then distributes it to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the key is encrypted using the public key of the receiver and subsequently decrypted using the receiver’s private key. When used in conjunction with a symmetric algorithm, the key is encrypted with a key-wrapping key shared by the sending and receiving parties and decrypted using the same key.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Key transport

  A key-establishment procedure whereby one party (the sender) selects and encrypts the keying material and then distributes the material to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the keying material is encrypted using the public key of the receiver and subsequently decrypted using the private key of the receiver. When used in conjunction with a symmetric algorithm, the keying material is encrypted with a key-encrypting key shared by the two parties.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Key transport