U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

keying material

Definition(s):

  Key, code, or authentication information in physical, electronic, or magnetic form. It includes key tapes and list, codes, authenticators, one-time pads, floppy disks, and magnetic tapes containing keys, plugs, keyed microcircuits, electronically generated key, etc.
Source(s):
CNSSI 4009-2015 from CNSSI 4005

  A bit string, such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys and secret parameters, such as initialization vectors.
Source(s):
NIST SP 800-107 Rev. 1 under Keying Material

  A binary string, such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys.
Source(s):
NIST SP 800-108 under Keying material

  Data that is represented as a binary string such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys. In this Recommendation, keying material is derived from a shared secret established during an execution of a key-establishment scheme or generated by the sender in a key-transport scheme. As used in this Recommendation, secret keying material may include keys, secret initialization vectors, and other secret parameters.
Source(s):
NIST SP 800-56A Rev. 2 [Superseded] under Keying material

  A binary string, such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys and secret parameters, such as initialization vectors.
Source(s):
NIST SP 800-56C [Superseded] under Keying material

  The data (e.g., keys and IVs) necessary to establish and maintain cryptographic keying relationships.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Keying material
NIST SP 800-57 Part 2 [Superseded] under Keying material
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Keying material

  Data that is represented as a binary string such that any non-overlapping segments of the string with the required lengths can be used as secret keys, secret initialization vectors and other secret parameters.
Source(s):
NIST SP 800-56B Rev. 2 under Keying material

  A cryptographic key and other parameters (e.g., IVs or domain parameters) used with a cryptographic algorithm.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Keying material
NIST SP 800-57 Part 1 Rev. 5 under Keying material

  A cryptographic key and other parameters (e.g., IVs or domain parameters) used with a cryptographic algorithm. When keying material is derived as specified in SP 800-56CSP 800-108:bit string such that any non-overlapping segments of the string with the required lengths 4 and 5 Data represented as a can be used as secret keys, secret initialization vectors, and other secret parameters.
Source(s):
NIST SP 800-175B Rev. 1 under Keying material

  Data that is represented as a binary string such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys. In this Recommendation, keying material is derived from a shared secret established during an execution of a key-agreement scheme, or transported by the sender in a key-transport scheme. As used in this Recommendation, secret keying material may include keys, secret initialization vectors, and other secret parameters.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded] under Keying material