Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Key wrapping

Abbreviation(s) and Synonym(s):

None

Definition(s):

  A method of encrypting and decrypting keys and (possibly) associated data using a symmetric key; both confidentiality and integrity protection are provided.
Source(s):
NIST SP 800-133

  A method of cryptographically protecting keys using a symmetric key that provides both confidentiality and integrity protection.
Source(s):
NIST SP 800-152
NIST SP 800-57 Part 1 Rev. 4

  In this Recommendation, key-wrapping is a method of protecting keying material using a symmetric-key-based authenticated encryption method, such as a block cipher key-wrapping mode specified in [NIST SP 800-38F] that provides both confidentiality and integrity protection.
Source(s):
NIST SP 800-56A Rev. 2 under Key-wrapping

  Encrypting a symmetric key using another symmetric key (the key encrypting key). A key used for key wrapping is known as a key encrypting key.
Source(s):
NIST SP 800-57 Part 2

  A method of protecting secret keying material (along with associated integrity information) that provides both confidentiality and integrity protection when using symmetric-key algorithms.
Source(s):
NIST SP 800-56B Rev. 2

  A method of providing both confidentiality and integrity protection for keying material using a symmetric key,
Source(s):
NIST SP 800-57 Part 2 Rev.1

  A method of encrypting and decrypting keys and (possibly) associated data using symmetric-key cryptography; both confidentiality and integrity protection are provided. See SP 800-38F. 6
Source(s):
NIST SP 800-133 Rev.1

  A method of protecting keying material (along with associated integrity information) that provides both confidentiality and integrity protection when using a symmetric-key algorithm.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded]

  A method of encrypting keys (along with associated integrity information) that provides both confidentiality and integrity protection using a symmetric key.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded]