This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing guidance on the management of keys and the selection of cryptographic features of currently available applications and systems. Part 3 focuses on helping system installers and system administrators select and use currently available key management infrastructures, protocols, and applications. It recommends secure combinations of algorithm suites, key sizes and other related options, and discusses the implementation issues that impact the security effectiveness of an organization s key management processes. The bulletin discusses the currently available key management infrastructures, protocols and applications that are presented in Part 3.
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing guidance on the management of keys and the...
See full abstract
This bulletin summarizes the information presented in NIST Special Publication (SP) 800-57, Recommendation for Key Management, Part 3, Application Specific Key Management Guidance. The publication supplements Parts 1 and 2 of SP 800-57, by providing guidance on the management of keys and the selection of cryptographic features of currently available applications and systems. Part 3 focuses on helping system installers and system administrators select and use currently available key management infrastructures, protocols, and applications. It recommends secure combinations of algorithm suites, key sizes and other related options, and discusses the implementation issues that impact the security effectiveness of an organization s key management processes. The bulletin discusses the currently available key management infrastructures, protocols and applications that are presented in Part 3.
Hide full abstract
Keywords
authentication; authorization; availability; certification; confidentiality; cryptographic key; cryptographic module; cryptography; data integrity; digital signature; encryption; information security; information systems security; key management; private key; public key; public key infrastructure; security plan; validation