U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

Secure websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to our website. Please do not share sensitive information with us.

This is an archive
(replace .gov by .rip)

SP 800-131A Rev. 1

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Date Published: November 2015

Supersedes: SP 800-131A (01/13/2011)

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST)

Abstract

Keywords

cryptographic algorithm; digital signatures; encryption; hash function; key agreement; key derivation functions; key management; key transport; key wrapping; message authentication codes; random number generation; security strength; transition
Control Families

None selected

Documentation

Publication:
SP 800-131A Rev. 1 (DOI)
Local Download

Supplemental Material:
Comments and resolutions on Draft (July 2015) (pdf)

Related NIST Publications:
SP 800-56A Rev. 2

Document History:
11/06/15: SP 800-131A Rev. 1

Topics

Security and Privacy
cryptography