Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

key transport

Abbreviation(s) and Synonym(s):

Key distribution

Definition(s):

  The transport of a key and other keying material from an entity that either owns or generates the key to another entity that is intended to use the key.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Key distribution
NIST SP 800-57 Part 1 Rev. 3 under Key distribution [Superseded]

  A key-establishment procedure whereby one party (the sender) selects and encrypts the keying material and then distributes the material to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the keying material is encrypted using the public key of the receiver and subsequently decrypted using the private key of the receiver. When used in conjunction with a symmetric algorithm, the keying material is encrypted with a key-encrypting key shared by the two parties.
Source(s):
CNSSI 4009-2015 NIST SP 800-57 Part 1 Rev. 3

  A key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver) using an asymmetric algorithm.
Source(s):
NIST SP 800-133 under Key transport

  See Key transport.
Source(s):
NIST SP 800-152 under Key distribution

  A manual or automated key-establishment procedure whereby one entity (the sender) selects and distributes the key to another entity (the receiver).
Source(s):
NIST SP 800-152 under Key transport

  A (pair-wise) key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver). Contrast with key agreement.
Source(s):
NIST SP 800-56A Rev. 2 under Key-transport
NIST SP 800-56B Rev. 2 under Key transport

  The transport of a key and other keying material from an entity that either owns the key or generates the key to another entity that is intended to use the key.
Source(s):
NIST SP 800-57 Part 2 under Key distribution

  Secure transport of cryptographic keys from one cryptographic module to another module. When used in conjunction with a public key (asymmetric) algorithm, keying material is encrypted using a public key and subsequently decrypted using a private key. When used in conjunction with a symmetric algorithm, key transport is known as key wrapping.
Source(s):
NIST SP 800-57 Part 2 under Key transport

  The transport of key information from one entity (the sender) to one or more other entities (the receivers). The sender may have generated the key information or acquired it from another source as part of a separate process. The key information may be distributed manually or using automated key transport mechanisms.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Key distribution

  A key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver).
Source(s):
NIST SP 800-133 Rev.1 under Key transport

  A key-establishment procedure whereby one party (the sender) selects and encrypts (or wraps) the keying material and then distributes the material to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the keying material is encrypted using the public key of the receiver and subsequently decrypted using the private key of the receiver. When used in conjunction with a symmetric algorithm, the keying material is encrypted with a key-wrapping key shared by the two parties.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Key transport

  A key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver). Contrast with key agreement.
Source(s):
NIST SP 800-56B Rev. 1 under Key transport [Superseded]

  A key-establishment procedure whereby one party (the sender) selects and encrypts the keying material and then distributes the material to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the keying material is encrypted using the public key of the receiver and subsequently decrypted using the private key of the receiver. When used in conjunction with a symmetric algorithm, the keying material is encrypted with a key-encrypting key shared by the two parties.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Key transport [Superseded]