[go: up one dir, main page]

Barker et al., 2016 - Google Patents

Nist special publication 800-57 part 1, revision 4

Barker et al., 2016

View PDF
Document ID
9874946345577998064
Author
Barker E
Dang Q
Publication year
Publication venue
NIST, Tech. Rep

External Links

Snippet

This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning …
Continue reading at csrc.nist.rip (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
Barker et al. Nist special publication 800-57 part 1, revision 4
Barker et al. NIST special publication 800-57
Barker Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms
Barker et al. Recommendation for cryptographic key generation
RU2718689C2 (en) Confidential communication control
EP1969762B1 (en) Certify and split system and method for replacing cryptographic keys
Barker et al. Recommendation for key management part 3: Application-specific key management guidance
Buchmann et al. Introduction to public key infrastructures
Obaidat et al. Security of E-systems and Computer Networks
CN100521601C (en) System and method for updating keys used for public key cryptography
JP3872107B2 (en) Encryption key recovery system
US8744078B2 (en) System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths
JP2022521525A (en) Cryptographic method for validating data
JP6041864B2 (en) Method, computer program, and apparatus for data encryption
Barker et al. Sp 800-57. recommendation for key management, part 1: General (revised)
Barker Cryptographic Standards in the Federal Government: Cryptographic Mechanisms
Lee Guideline for implementing cryptography in the federal government
Chauhan et al. Enhancing Mobile Cloud Computing Security with SHA-256 and RSA for User Authentication and Data Sharing
Banday Easing PAIN with digital signatures
US12261946B2 (en) System and method of creating symmetric keys using elliptic curve cryptography
US20250202954A1 (en) Lawful interception of an encrypted communication with a proof-of-work-protected key
Barker Draft NIST SP 800-71, Recommendation for Key Establishment Using Symmetric Block Ciphers
G-SB21BCA015 SECURING MEDICAL IMAGING
Bhattacharya et al. Secure Chains: Cybersecurity and Blockchain-powered Automation
Murugesan PGP Based RSA Encryption for MFA in Web Applications