Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Secret keying material

Abbreviation(s) and Synonym(s):

None

Definition(s):

  As used in this Recommendation, the secret keying material that is either (1) derived by applying the key-derivation method to the shared secret and other shared information during a key-agreement transaction, or (2) is transported during a key-transport transaction.
Source(s):
NIST SP 800-56B Rev. 1 under Secret keying material (that is shared)

  The binary data that is used to form secret keys, such as AES encryption or HMAC keys.
Source(s):
NIST SP 800-107 Rev. 1

  The binary data that is used to form secret keys, such as AES encryption keys or HMAC keys.
Source(s):
NIST SP 800-135 Rev. 1