Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

This is an archive
(replace .gov by .rip)

SP 800-57 Part 3

Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance

Date Published: December 2009

Withdrawn: January 1, 2015

Superseded By: SP 800-57 Part 3 Rev. 1 (January 2015);

Author(s)

Elaine Barker (NIST), William Burr (NIST), Alicia Jones (BAH), Tim Polk (NIST), Scott Rose (NIST), Miles Smid (Orion Security Solutions), Quynh Dang (NIST)

Abstract

Keywords

Accreditation; assurances; authentication; authorization; availability; backup; certification; compromise; confidentiality; cryptanalysis; cryptographic key; cryptographic module; digital signature; key management; key management policy; key recovery; private key; public key; public key infrastructure; security plan; trust anchor; validation;
Control Families

Access Control; Audit and Accountability; Contingency Planning; Media Protection; Planning; System and Communications Protection; System and Information Integrity;

Documentation

Publication:
Archived File (DOI)
Local Download

Supplemental Material:
None available