Barker et al., 2016 - Google Patents
Nist special publication 800-57 part 1, revision 4Barker et al., 2016
View PDF- Document ID
- 9874946345577998064
- Author
- Barker E
- Dang Q
- Publication year
- Publication venue
- NIST, Tech. Rep
External Links
Snippet
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning …
- 239000000463 material 0 abstract description 109
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barker et al. | Nist special publication 800-57 part 1, revision 4 | |
Barker et al. | NIST special publication 800-57 | |
Barker | Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms | |
Barker et al. | Recommendation for cryptographic key generation | |
RU2718689C2 (en) | Confidential communication control | |
EP1969762B1 (en) | Certify and split system and method for replacing cryptographic keys | |
Barker et al. | Recommendation for key management part 3: Application-specific key management guidance | |
Buchmann et al. | Introduction to public key infrastructures | |
Obaidat et al. | Security of E-systems and Computer Networks | |
CN100521601C (en) | System and method for updating keys used for public key cryptography | |
JP3872107B2 (en) | Encryption key recovery system | |
US8744078B2 (en) | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths | |
JP2022521525A (en) | Cryptographic method for validating data | |
JP6041864B2 (en) | Method, computer program, and apparatus for data encryption | |
Barker et al. | Sp 800-57. recommendation for key management, part 1: General (revised) | |
Barker | Cryptographic Standards in the Federal Government: Cryptographic Mechanisms | |
Lee | Guideline for implementing cryptography in the federal government | |
Chauhan et al. | Enhancing Mobile Cloud Computing Security with SHA-256 and RSA for User Authentication and Data Sharing | |
Banday | Easing PAIN with digital signatures | |
US12261946B2 (en) | System and method of creating symmetric keys using elliptic curve cryptography | |
US20250202954A1 (en) | Lawful interception of an encrypted communication with a proof-of-work-protected key | |
Barker | Draft NIST SP 800-71, Recommendation for Key Establishment Using Symmetric Block Ciphers | |
G-SB21BCA015 | SECURING MEDICAL IMAGING | |
Bhattacharya et al. | Secure Chains: Cybersecurity and Blockchain-powered Automation | |
Murugesan | PGP Based RSA Encryption for MFA in Web Applications |