Date Published: December 2012
            
            
            
            
            
                
            
            
            
            
            
            
            Author(s)
            
            Elaine Barker (NIST),
            Allen Roginsky (NIST)
            
            
            
            
                
                
                    Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.
                
                
                    
                    
                        Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorith...
                        
See full abstract
                     
                    
                        Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.
                        Hide full abstract
                     
                    
                 
                
                Keywords
                key agreement; key derivation; key generation; key replacement; key transport; key update; key wrapping; private key; public key; asymmetric key; symmetric key; 
            
 
            
            Control Families
            
                
                None selected