Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

Key Management

Project Overview

Publications that discuss the generation, establishment, storage, use and destruction of the keys used NIST’s cryptographic algorithms

Project Areas:

Generally-speaking, there are two types of key establishment techniques: 1) techniques based on asymmetric (public key) algorithms, and 2) techniques based on symmetric (secret key) algorithms. However, hybrid techniques are also commonly used, whereby public key techniques are used to establish symmetric (secret) key encryption keys, which are then used to establish other symmetric (secret) keys.

Implementation-related References

Created January 04, 2017, Updated November 20, 2018