Try the new CSRC.nist.gov and let us know what you think!
(Note: Beta site content may not be complete.)

View the beta site
NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

Cryptographic Key Management Project

Cryptographic Key Management (CKM) is a fundamental part of cryptographic technology and is considered one of the most difficult aspects associated with its use. Of particular concern are the scalability of the methods used to distribute keys and the usability of these methods. NIST has undertaken an effort to improve the overall key management strategies used by the public and private sectors in order to enhance the usability of cryptographic technology, provide scalability across cryptographic technologies, and support a global cryptographic key management infrastructure.


Cryptographic Key Management Workshop Summary (June 2009)

NIST Internal Report 7609, Cryptographic Key Management Workshop Summary - June 8-9, 2009, is now available. This document provides highlights of a workshop that was held in June 2009 to discuss the current state of key management systems, to identify future needs, and to discuss the development of a Cryptographic Key Management Design Framework that will address the issues discussed during the workshop.


Special Publication 800-130, A Framework for Designing Cryptographic Key Management Systems

August 16, 2013: NIST announces the completion of Special Publication (SP) 800-130, A Framework for Designing Cryptographic Key Management Systems. This publication contains a description of the topics to be considered and the documentation requirements to be addressed when designing a CKMS. The CKMS designer satisfies the requirements by selecting the policies, procedures, components (hardware, software, and firmware), and devices (groups of components) to be incorporated into the CKMS, and then specifying how these items are employed to meet the requirements of this Framework.


Special Publication 800-131A, Revision 1, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths.

NIST announces the completion of Special Publication (SP) 800-131A, Rev. 1, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. SP 800-131A, Rev. 1 provides guidance for transitions to the use of stronger cryptographic keys and more robust algorithms by Federal government agencies when protecting sensitive, but unclassified information. 

Comments received on SP 800-131 [by August 14, 2015 deadline]

Comments received on SP 800-131 [by March 15 deadline].

Comments received on SP 800-131 [by July 16 deadline].


Back to Top

 

Special Publication 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems (CKMS)

October 30, 2015: NIST announces the publication of Special Publication (SP) 800-152: A Profile for U. S. Federal Cryptographic Key Management Systems. This document contains requirements for the design, implementation, procurement, installation, configuration, management, operation, and use of a Key Management System by U. S. Federal organizations. The Profile is based on NIST Special Publication (SP) 800-130: A Framework for Designing Cryptographic Key Management Systems (CKMS).

Final comments received for final draft of SP 800-152.

December 18, 2014: NIST requested comments on DRAFT Special Publication (SP) 800-152, A Profile for U.S. Federal Cryptographic Key Management Systems. The public comment period ended February 18, 2015.

Comments received on SP 800-152 (by February 18, 2015 deadline)


January 6, 2014
: NIST requested comments on NIST Special Publication (SP) 800-152, A Profile for U.S. Federal Cryptographic Key Management Systems. The public comment period ended March 5, 2014.

Comments Received on Draft SP 800-152


August 8, 2012
:NIST requested comments on draft NIST Special Publication 800-152, A Profile for U. S. Federal Cryptographic Key Management Systems (CKMS). The public comment period ended October 10, 2012.


Questions regarding this project should be addressed to Elaine Barker of NIST.