A public key and its corresponding private key; a key pair is used with a public key algorithm.
Source(s):
CNSSI 4009-2015
from
NIST SP 800-57 Part 1 Rev. 3
NIST SP 800-57 Part 2
[Superseded]
under Key pair
A private key and its corresponding public key; a key pair is used with an asymmetric-key (public-key) algorithm.
Source(s):
NIST SP 800-133
[Superseded]
under Key pair
NIST SP 800-133 Rev.1
[Superseded]
under Key pair
NIST SP 800-133 Rev. 2
under Key pair
Two mathematically related keys having the properties that (1) one key can be used to encrypt a message that can only be decrypted using the other key, and (ii) even knowing one key, it is computationally infeasible to discover the other key.
Source(s):
NIST SP 800-32
under Key Pair
A public key and its corresponding private key; a key pair is used with a public-key algorithm.
Source(s):
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
under Key pair
NIST SP 800-57 Part 1 Rev. 5
under Key pair
NIST SP 800-56B Rev. 1
[Superseded]
under Key pair
NIST SP 800-57 Part 1 Rev. 3
[Superseded]
under Key pair
A public key and its corresponding private key.
Source(s):
NIST SP 800-89
under Key pair
See key-establishment key pair.
Source(s):
NIST SP 800-56B Rev. 2
under Key pair
A public key and its corresponding private key. A key pair is used with a public key algorithm.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Key pair
A public key and its corresponding private key; a key pair is used with a public-key (asymmetric-key) algorithm.
Source(s):
NIST SP 800-175B Rev. 1
under Key pair