[go: up one dir, main page]

Barker et al., 2009 - Google Patents

Recommendation for key management part 3: Application-specific key management guidance

Barker et al., 2009

View PDF
Document ID
16395597512588962929
Author
Barker E
Burr W
Jones A
Polk T
Rose S
Smid M
Dang Q
et al.
Publication year
Publication venue
NIST special publication

External Links

Snippet

Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning …
Continue reading at rfc.nop.hu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
Barker et al. Recommendation for key management part 3: Application-specific key management guidance
Hickman et al. The SSL protocol
RU2718689C2 (en) Confidential communication control
Salowey et al. Transport layer security (TLS) session resumption without server-side state
US7584505B2 (en) Inspected secure communication protocol
KR100568233B1 (en) Device authentication method using a certificate and digital content processing device performing device authentication using the method
JP2021500832A5 (en)
Schaad et al. Certificate management over CMS (CMC)
Barker et al. Sp 800-57. recommendation for key management, part 1: General (revised)
Polk et al. Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations
US20160344725A1 (en) Signal haystacks
EP3785409B1 (en) Data message sharing
Spies Public key infrastructure
KR100984275B1 (en) How to generate a security key using a non-certificate public key on an insecure communication channel
KR100970552B1 (en) How to generate a security key using a non-certificate public key
Hughes Pro Active Directory Certificate Services
Gilchrist The Concise Guide to SSL/TLS for DevOps
Sherwood Practical Implications of Public Key Infrastructure for Identity Professionals (v2)
Chokhani et al. PKI and certificate authorities
CN118540135B (en) System component communication method and storage medium applied to port network security
US12261946B2 (en) System and method of creating symmetric keys using elliptic curve cryptography
CN114531235B (en) Communication method and system for end-to-end encryption
IES20070726A2 (en) Automated authenticated certificate renewal system
Reaz et al. A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App
Spies Public Key Infrastructure