U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

SP 800-131A Rev. 2

Transitioning the Use of Cryptographic Algorithms and Key Lengths

Date Published: March 2019

Supersedes: SP 800-131A Rev. 1 (11/06/2015)

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST)

Abstract

Keywords

cryptographic algorithm; digital signatures; encryption; hash function; key agreement; key derivation functions; key management; key transport; key wrapping; message authentication codes; post-quantum algorithms; random number generation; security strength; transition
Control Families

System and Information Integrity; System and Communications Protection

Documentation

Publication:
SP 800-131A Rev. 2 (DOI)
Local Download

Supplemental Material:
Comments received on Draft SP 800-131A Rev. 2 (pdf)

Related NIST Publications:
SP 800-57 Part 1 Rev. 4

Document History:
07/19/18: SP 800-131A Rev. 2 (Draft)
03/21/19: SP 800-131A Rev. 2 (Final)

Topics

Security and Privacy
key management