U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

SP 800-133 Rev. 2 (Draft)

Recommendation for Cryptographic Key Generation

Date Published: March 2020
Comments Due: April 17, 2020 (public comment period is CLOSED)
Email Questions to: sp-800-133_comments@nist.gov

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST), Richard Davis (NSA)

Announcement

This draft of SP 800-133 Revision 2 discusses the generation of the keys to be managed and used by the approved cryptographic algorithms, and it provides a method for determining a symmetric key by combining multiple keys and other data.

NOTE: A call for patent claims is included on page iii of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.

Abstract

Keywords

asymmetric key; key agreement; key derivation; key generation; key wrapping; key replacement; key transport; private key; public key; symmetric key
Control Families

None selected

Documentation

Publication:
SP 800-133 Rev. 2 (Draft) (DOI)
Local Download

Supplemental Material:
Comments received (pdf)

Document History:
03/05/20: SP 800-133 Rev. 2 (Draft)
06/04/20: SP 800-133 Rev. 2 (Final)

Topics

Security and Privacy
key management