U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

ITL Bulletin

Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information

Date Published: December 2012

Author(s)

Shirley Radack (NIST)

Abstract

Keywords

asymmetric keys; authentication; cryptographic keys; cryptographic modules; cyber security; decryption; encryption; information security; information systems; key generation; key management; public keys; private keys; random bit generation; security management; symmetric keys; security requirements; security risks
Control Families

None selected

Documentation

Publication:
December 2012 ITL Bulletin (pdf)

Supplemental Material:
None available

Document History:
12/19/12: ITL Bulletin (Final)

Topics

Security and Privacy

cryptography