Date Published: August 2005
Author(s)
Elaine Barker (NIST), William Barker (NIST), William Burr (NIST), W. Polk (NIST), Miles Smid (Orion Security Solutions)
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government...
See full abstract
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
Hide full abstract
Keywords
Accreditation; certification; cryptographic key; digital signature; key management; key management policy; public key; public key infrastructure; security plan
Control Families
Access Control;
Audit and Accountability;
Contingency Planning;
Media Protection;
Planning;
System and Communications Protection;
System and Information Integrity;