U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

SP 800-131A Rev. 1

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Date Published: November 2015

Supersedes: SP 800-131A (01/13/2011)

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST)

Abstract

Keywords

cryptographic algorithm; digital signatures; encryption; hash function; key agreement; key derivation functions; key management; key transport; key wrapping; message authentication codes; random number generation; security strength; transition
Control Families

None selected

Documentation

Publication:
SP 800-131A Rev. 1 (DOI)
Local Download

Supplemental Material:
Comments and resolutions on Draft (July 2015) (pdf)

Related NIST Publications:
SP 800-56A Rev. 2

Document History:
11/06/15: SP 800-131A Rev. 1

Topics

Security and Privacy
cryptography