U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

SP 800-71 (Draft)

Recommendation for Key Establishment Using Symmetric Block Ciphers

Date Published: July 2018
Comments Due: September 28, 2018 (public comment period is CLOSED)
Email Questions to: SP_800-71@nist.gov

Author(s)

Elaine Barker (NIST), William Barker (Dakota Consulting)

Announcement

Draft NIST Special Publication (SP) 800-71, Recommendations for Key Establishment Using Symmetric Block Ciphers, addresses key establishment techniques that use symmetric key cryptography algorithms to protect symmetric keying material. The objective is to provide recommendations for reducing exposure to the unauthorized disclosure of the keying material and detecting its unauthorized modification, substitution, insertion or deletion. The Recommendation also addresses recovery in the event of detectable errors during the key-distribution process. Wrapping mechanisms are specified for encrypting keys, binding key control information to the keys and protecting the integrity of this information.

Abstract

Keywords

algorithm; authentication; block cipher; key distribution; key establishment; key generation; key management; key translation; key wrapping; message authentication code; symmetric key
Control Families

System and Communications Protection; System and Information Integrity

Documentation

Publication:
Draft SP 800-71

Supplemental Material:
None available

Related NIST Publications:
SP 800-57 Part 1 Rev. 4
SP 800-57 Part 2
SP 800-57 Part 3 Rev. 1
SP 800-152

Document History:
07/02/18: SP 800-71 (Draft)

Topics

Security and Privacy
key management; post-quantum cryptography

Technologies
networks