Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

SP 800-57 Part 1 Rev. 3

Recommendation for Key Management, Part 1: General (Revision 3)

Date Published: July 2012

Withdrawn: January 28, 2016

Superseded By: SP 800-57 Part 1 Rev. 4 (January 2016)
Supersedes: SP 800-57 Part 1 Revised (March 2007)

Author(s)

Elaine Barker (NIST), William Barker (NIST), William Burr (NIST), W. Polk (NIST), Miles Smid (Orion Security Solutions)

Abstract

Keywords

Assurances; authentication; authorization; availability; backup; compromise; confidentiality; cryptanalysis; cryptographic key; cryptographic module; digital signature; hash function; key agreement; key management; key management policy; key recovery; key transport; originator usage period; private key; public key; recipient usage period; secret key; split knowledge; trust anchor.
Control Families

Access Control; Audit and Accountability; Contingency Planning; Media Protection; Planning; System and Communications Protection; System and Information Integrity;