U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

key management

Abbreviation(s) and Synonym(s):

KMN

Definition(s):

  The activities involving the handling of cryptographic keys and other related security parameters (e.g. passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and destruction.
Source(s):
CNSSI 4009-2015 from NIST SP 800-57 Part 1 Rev. 3

  The activities involving the handling of cryptographic keys and other related security parameters (e.g., initialization vectors) during the entire lifecycle of the keys, including their generation, storage, establishment, entry and output, use and destruction.
Source(s):
NIST SP 800-12 Rev. 1 under Key Management from NIST SP 800-57 Part 1 Rev. 4
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Key management

  The activities involved in the handling of cryptographic keys and other related parameters (e.g., IVs and domain parameters) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output into cryptographic modules, use and destruction.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Key management

  The activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and destruction.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Key management

  The activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs and counters) during the entire life cycle of the keys, including their generation, storage, establishment, entry, output, use, and destruction.
Source(s):
NIST SP 800-175B Rev. 1 under Key management

  The activities involving the handling of cryptographic keys and other related key information during the entire lifecycle of the keys, including their generation, storage, establishment, entry and output, use, and destruction.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Key management

  The activities involved in the handling of cryptographic keys and other related security parameters (e.g., initialization vectors (IVs) and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and destruction.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded] under Key management

  The activities involving the handling of cryptographic keys and other related security parameters (e.g., passwords) during the entire lifecycle of the keys, including their generation, storage, establishment, entry and output, use and destruction.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Key management