Date Published: December 2009
Withdrawn:
January 1, 2015
Superseded By:
SP 800-57 Part 3 Rev. 1 (January 2015);
Author(s)
Elaine Barker (NIST),
William Burr (NIST),
Alicia Jones (BAH),
Tim Polk (NIST),
Scott Rose (NIST),
Miles Smid (Orion Security Solutions),
Quynh Dang (NIST)
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies....
See full abstract
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
Hide full abstract
Keywords
Accreditation; assurances; authentication; authorization; availability; backup; certification; compromise; confidentiality; cryptanalysis; cryptographic key; cryptographic module; digital signature; key management; key management policy; key recovery; private key; public key; public key infrastructure; security plan; trust anchor; validation;
Control Families
Access Control;
Audit and Accountability;
Contingency Planning;
Media Protection;
Planning;
System and Communications Protection;
System and Information Integrity;