Date Published: August 2005 
            
            
            
            
            
            
            
			
			
            
            
            
            
            
            
			
            
            Author(s)
            Elaine Barker (NIST), William Barker (NIST), William Burr (NIST), W. Polk (NIST), Miles Smid (Orion Security Solutions)
            
            
            
            
            
                
                
                    This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
                 
                
                    
                    
                        This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government...
                        
See full abstract
                    
                        This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
                        Hide full abstract
                     
                    
                 
                Keywords
 Accreditation; certification; cryptographic key; digital signature; key management; key management policy; public key; public key infrastructure; security plan
            
 
            
            Control Families
            
                
                
                    Access Control; 
                
                    Audit and Accountability; 
                
                    Contingency Planning; 
                
                    Media Protection; 
                
                    Planning; 
                
                    System and Communications Protection; 
                
                    System and Information Integrity;