Key, code, or authentication information in physical, electronic, or magnetic form. It includes key tapes and list, codes, authenticators, one-time pads, floppy disks, and magnetic tapes containing keys, plugs, keyed microcircuits, electronically generated key, etc.
Source(s):
CNSSI 4009-2015
from
CNSSI 4005
A bit string, such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys and secret parameters, such as initialization vectors.
Source(s):
NIST SP 800-107 Rev. 1
under Keying Material
A binary string, such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys.
Source(s):
NIST SP 800-108
under Keying material
Data that is represented as a binary string such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys. In this Recommendation, keying material is derived from a shared secret established during an execution of a key-establishment scheme or generated by the sender in a key-transport scheme. As used in this Recommendation, secret keying material may include keys, secret initialization vectors, and other secret parameters.
Source(s):
NIST SP 800-56A Rev. 2
[Superseded]
under Keying material
A binary string, such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys and secret parameters, such as initialization vectors.
Source(s):
NIST SP 800-56C
[Superseded]
under Keying material
The data (e.g., keys and IVs) necessary to establish and maintain cryptographic keying relationships.
Source(s):
NIST SP 800-57 Part 1 Rev. 4
[Superseded]
under Keying material
NIST SP 800-57 Part 2
[Superseded]
under Keying material
NIST SP 800-57 Part 1 Rev. 3
[Superseded]
under Keying material
Data that is represented as a binary string such that any non-overlapping segments of the string with the required lengths can be used as secret keys, secret initialization vectors and other secret parameters.
Source(s):
NIST SP 800-56B Rev. 2
under Keying material
A cryptographic key and other parameters (e.g., IVs or domain parameters) used with a cryptographic algorithm.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Keying material
NIST SP 800-57 Part 1 Rev. 5
under Keying material
A cryptographic key and other parameters (e.g., IVs or domain parameters) used with a cryptographic algorithm. When keying material is derived as specified in SP 800-56CSP 800-108:bit string such that any non-overlapping segments of the string with the required lengths 4 and 5 Data represented as a can be used as secret keys, secret initialization vectors, and other secret parameters.
Source(s):
NIST SP 800-175B Rev. 1
under Keying material
Data that is represented as a binary string such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys. In this Recommendation, keying material is derived from a shared secret established during an execution of a key-agreement scheme, or transported by the sender in a key-transport scheme. As used in this Recommendation, secret keying material may include keys, secret initialization vectors, and other secret parameters.
Source(s):
NIST SP 800-56B Rev. 1
[Superseded]
under Keying material