Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

SP 800-131A Rev. 1

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Date Published: November 2015

Supersedes: SP 800-131A (January 2011)

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST)

Abstract

Keywords

cryptographic algorithm; digital signatures; encryption; hash function; key agreement; key derivation functions; key management; key transport; key wrapping; message authentication codes; random number generation; security strength; transition
Control Families

None selected

Documentation

Publication:
SP 800-131A Rev. 1 (DOI)
Local Download

Supplemental Material:
Comments and resolutions on Draft (July 2015) (pdf)

Related NIST Publications:
SP 800-56A Rev. 2

Topics

Security and Privacy
cryptography