Secret key
A cryptographic key that is used to perform both the cryptographic operation and its inverse, for example to encrypt and decrypt, or create a message authentication code and to verify the code.
Source(s):
CNSSI 4009-2015
NIST SP 800-63-2
NIST SP 800-63-2
under Symmetric Key
[Superseded]
A cryptographic key used by one or more (authorized) entities in a symmetric-key cryptographic algorithm; the key is not made public.
Source(s):
NIST SP 800-133
under Secret key
[Superseded]
NIST SP 800-133 Rev.1
under Secret key
[Superseded]
See Secret key.
Source(s):
NIST SP 800-133
under Symmetric key
[Superseded]
NIST SP 800-133 Rev.1
under Symmetric key
[Superseded]
NIST SP 800-152
under Symmetric key
A cryptographic key used by a secret-key (symmetric) cryptographic algorithm and that is not made public.
Source(s):
NIST SP 800-152
under Secret key
A single cryptographic key that is used with a secret (symmetric) key algorithm.
Source(s):
NIST SP 800-57 Part 1 Rev. 4
under Symmetric key
[Superseded]
NIST SP 800-56B Rev. 1
under Symmetric key
[Superseded]
NIST SP 800-57 Part 1 Rev. 3
under Symmetric key
[Superseded]
A cryptographic key that is used with a secret-key (symmetric) cryptographic algorithm that is uniquely associated with one or more entities and is not made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.
Source(s):
NIST SP 800-57 Part 1 Rev. 4
under Secret key
[Superseded]
NIST SP 800-57 Part 1 Rev. 3
under Secret key
[Superseded]
A cryptographic key that is used with a secret key (also known as a symmetric key) cryptographic algorithm that is uniquely associated with one or more entities and shall not be made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.
Source(s):
NIST SP 800-57 Part 2
under Secret key
[Superseded]
A single cryptographic key that is shared by both originator and recipient (see symmetric key algorithm)
Source(s):
NIST SP 800-57 Part 2
under Symmetric key
[Superseded]
A cryptographic key used to perform both the cryptographic operation and its inverse. For example, to encrypt and decrypt or create a message authentication code and to verify the code.
Source(s):
NIST SP 800-63-3
under Symmetric Key
A cryptographic key that is shared between two or more entities and used with a cryptographic application to process information.
Source(s):
NIST SP 800-56B Rev. 2
under Symmetric key
A single cryptographic key that is used by one or more entities with a symmetric key algorithm.
Source(s):
NIST SP 800-57 Part 2 Rev.1
under Symmetric key
A single cryptographic key that is used with a symmetric (secret key) cryptographic algorithm and is not made public (i.e., the key is kept secret). A secret key is also called a symmetric key.
Source(s):
NIST SP 800-175B Rev. 1
under Secret key
The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure.
Source(s):
NIST SP 800-175B Rev. 1
under Secret key
Compare with a private key, which is used with a public-key (asymmetric-key) algorithm.
Source(s):
NIST SP 800-175B Rev. 1
under Secret key
A single cryptographic key that is used with a symmetric (secret key) algorithm, is uniquely associated with one or more entities, and is not made public (i.e., the key is kept secret); a symmetric key is often called a secret key.
Source(s):
NIST SP 800-175B Rev. 1
under Symmetric key
A single cryptographic key that is used with a symmetric-key cryptographic algorithm, is uniquely associated with one or more entities and is not made public (i.e., the key is kept secret). A secret key is also called a Symmetric key. The use of the term “secret” in this context does not imply a classification level but rather implies the need to protect the key from disclosure.
Source(s):
NIST SP 800-57 Part 1 Rev. 5
under Secret key
A single cryptographic key that is used with a symmetric-key cryptographic algorithm, is uniquely associated with one or more entities, and is not made public (i.e., the key is kept secret). A symmetric key is often called a secret key. See Secret key.
Source(s):
NIST SP 800-57 Part 1 Rev. 5
under Symmetric key