Barker et al., 2009 - Google Patents
Recommendation for key management part 3: Application-specific key management guidanceBarker et al., 2009
View PDF- Document ID
- 16395597512588962929
- Author
- Barker E
- Burr W
- Jones A
- Polk T
- Rose S
- Smid M
- Dang Q
- et al.
- Publication year
- Publication venue
- NIST special publication
External Links
Snippet
Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning …
- 230000004224 protection 0 description 58
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barker et al. | Recommendation for key management part 3: Application-specific key management guidance | |
Hickman et al. | The SSL protocol | |
RU2718689C2 (en) | Confidential communication control | |
Salowey et al. | Transport layer security (TLS) session resumption without server-side state | |
US7584505B2 (en) | Inspected secure communication protocol | |
KR100568233B1 (en) | Device authentication method using a certificate and digital content processing device performing device authentication using the method | |
JP2021500832A5 (en) | ||
Schaad et al. | Certificate management over CMS (CMC) | |
Barker et al. | Sp 800-57. recommendation for key management, part 1: General (revised) | |
Polk et al. | Guidelines for the selection, configuration, and use of transport layer security (TLS) implementations | |
US20160344725A1 (en) | Signal haystacks | |
EP3785409B1 (en) | Data message sharing | |
Spies | Public key infrastructure | |
KR100984275B1 (en) | How to generate a security key using a non-certificate public key on an insecure communication channel | |
KR100970552B1 (en) | How to generate a security key using a non-certificate public key | |
Hughes | Pro Active Directory Certificate Services | |
Gilchrist | The Concise Guide to SSL/TLS for DevOps | |
Sherwood | Practical Implications of Public Key Infrastructure for Identity Professionals (v2) | |
Chokhani et al. | PKI and certificate authorities | |
CN118540135B (en) | System component communication method and storage medium applied to port network security | |
US12261946B2 (en) | System and method of creating symmetric keys using elliptic curve cryptography | |
CN114531235B (en) | Communication method and system for end-to-end encryption | |
IES20070726A2 (en) | Automated authenticated certificate renewal system | |
Reaz et al. | A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App | |
Spies | Public Key Infrastructure |