U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Key wrapping

Definition(s):

  A method of cryptographically protecting keys using a symmetric key that provides both confidentiality and integrity protection.
Source(s):
NIST SP 800-152
NIST SP 800-57 Part 1 Rev. 5
NIST SP 800-57 Part 1 Rev. 4 [Superseded]

  A method of protecting secret keying material (along with associated integrity information) that provides both confidentiality and integrity protection when using symmetric-key algorithms.
Source(s):
NIST SP 800-56B Rev. 2

  A method of providing both confidentiality and integrity protection for keying material using a symmetric key,
Source(s):
NIST SP 800-57 Part 2 Rev.1

  A method of cryptographically protecting the confidentiality and integrity of keys using a symmetric-key algorithm.
Source(s):
NIST SP 800-175B Rev. 1

  A method of encrypting and decrypting keys and (possibly) associated data using symmetric-key cryptography; both confidentiality and integrity protection are provided; see SP 800-38F.
Source(s):
NIST SP 800-133 Rev. 2

  A method of encrypting and decrypting keys and (possibly) associated data using a symmetric key; both confidentiality and integrity protection are provided.
Source(s):
NIST SP 800-133 [Superseded]

  In this Recommendation, key-wrapping is a method of protecting keying material using a symmetric-key-based authenticated encryption method, such as a block cipher key-wrapping mode specified in [NIST SP 800-38F] that provides both confidentiality and integrity protection.
Source(s):
NIST SP 800-56A Rev. 2 [Superseded] under Key-wrapping

  A method of protecting keying material (along with associated integrity information) that provides both confidentiality and integrity protection when using a symmetric-key algorithm.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded]

  A method of encrypting keys (along with associated integrity information) that provides both confidentiality and integrity protection using a symmetric key.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded]

  Encrypting a symmetric key using another symmetric key (the key encrypting key). A key used for key wrapping is known as a key encrypting key.
Source(s):
NIST SP 800-57 Part 2 [Superseded]

  A method of encrypting and decrypting keys and (possibly) associated data using symmetric-key cryptography; both confidentiality and integrity protection are provided. See SP 800-38F. 6
Source(s):
NIST SP 800-133 Rev.1 [Superseded]