Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cryptographic key

Abbreviation(s) and Synonym(s):

Key

Definition(s):

  A parameter used in conjunction with a cryptographic algorithm that determines the specific operation of that algorithm.
Source(s):
FIPS 201 under Cryptographic Key (Key) [Withdrawn]

  See “Cryptographic Key”.
Source(s):
FIPS 201 under Key [Withdrawn]

  A value used to control cryptographic operations, such as decryption, encryption, signature generation or signature verification. For the purposes of this document, key requirements shall meet the minimum requirements stated in Table 2 of NIST SP 800-57 Part 1. See also Asymmetric keys, Symmetric key.
Source(s):
NIST SP 800-63-2 under Cryptographic Key [Superseded]

  A parameter that determines the transformation from plaintext to ciphertext and vice versa. (A DEA key is a 64-bit parameter consisting of 56 independent bits and 8 parity bits). Multiple (1, 2 or 3) keys may be used in the Triple Data Encryption Algorithm.
Source(s):
NIST SP 800-20 under Cryptographic key

  A parameter used in the block cipher algorithm that determines the forward cipher function.
Source(s):
NIST SP 800-38C under Cryptographic Key

  A parameter used with a cryptographic algorithm that determines its operation.
Source(s):
NIST SP 800-56B Rev. 1 under Cryptographic key (Key)

  A parameter that determines the operation of a cryptographic function, such as: 1. The transformation from plaintext to ciphertext and vice versa, 2. The generation of keying material, or 3. A digital signature computation or verification.
Source(s):
NIST SP 800-90A Rev. 1 under Cryptographic Key (Key)

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples of cryptographic operations requiring the use of cryptographic keys include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received authentication code, 7. The computation of a shared secret that is used to derive keying material. 8. The derivation of additional keying material from a key-derivation key (i.e., a pre-shared key).
Source(s):
NIST SP 800-133 under Cryptographic key (key)

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce, reverse or verify the operation, while an entity without knowledge of the key cannot. Examples include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature on data, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received authentication code, 7. The computation of a shared secret that is used to derive keying material.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Cryptographic key (key)

  See Cryptographic Key.
Source(s):
NIST SP 800-90A Rev. 1 under Key

  See cryptographic key.
Source(s):
NIST SP 800-133 under Key
NIST SP 800-20 under Key
NIST SP 800-67 Rev. 2 under Key
NIST SP 800-67 Rev. 1 under Key [Superseded]

  The parameter of the block cipher that determines the selection of the forward cipher function from the family of permutations.
Source(s):
NIST SP 800-38D under Key

  A parameter used in conjunction with a cryptographic algorithm that determines its operation. Examples applicable to this Standard include: 1. The computation of a digital signature from data, and 2. The verification of a digital signature.
Source(s):
NIST SP 800-12 Rev. 1 under Key (FIPS 186-4)

  See Cryptographic key.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Key [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Key

  A  binary  string  used  as  a  secret  parameter  by  a  cryptographic algorithm. In this Recommendation, a cryptographic key shall be either a truly random binary string of a length specified by the cryptographic algorithm or a pseudorandom binary string of the specified length that is computationally indistinguishable from one selected uniformly at random from the set of all binary strings of that length.
Source(s):
NIST SP 800-108 under Cryptographic key

  A parameter used in the block cipher algorithm that determines the forward cipher operation and the inverse cipher operation.
Source(s):
NIST SP 800-38A under Cryptographic Key

  A parameter that determines the transformation using DEA and TDEA forward and inverse operations.
Source(s):
NIST SP 800-67 Rev. 2 under Cryptographic Key
NIST SP 800-67 Rev. 1 under Cryptographic Key [Superseded]

  A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. For the purposes of these guidelines, key requirements shall meet the minimum requirements stated in Table 2 of NIST SP 800-57 Part 1. See also Asymmetric Keys, Symmetric Key.
Source(s):
NIST SP 800-63-3 under Cryptographic Key

  A parameter used in conjunction with a cryptographic algorithm that determines the algorithm’s operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received authentication code.
Source(s):
NIST SP 800-135 Rev. 1 under Cryptographic key (key)

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples include: 1. The transformation of plaintext data into ciphertext data, 2. The transformation of ciphertext data into plaintext data, 3. The computation of a digital signature from data, 4. The verification of a digital signature, 5. The computation of an authentication code from data, 6. The verification of an authentication code from data and a received authentication code, 7. The computation of a shared secret that is used to derive keying material.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Cryptographic key (key) [Superseded]

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples include: • the transformation of plaintext data into ciphertext data, • the transformation of ciphertext data into plaintext data, • the computation of a digital signature from data, • the verification of a digital signature, • the computation of an authentication code from data, • the computation of a shared secret that is used to derive keying material.
Source(s):
NIST SP 800-57 Part 2 under Cryptographic key (key)

  A parameter used in conjunction with a cryptographic algorithm that determines its operation. Examples applicable to this Recommendation include: 1. The computation of a digital signature from data, and 2. The verification of a digital signature.
Source(s):
NIST SP 800-102 under Key

  A parameter used with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. Examples applicable to this Recommendation include: 1. The computation of a keyed-hash message authentication code. 2. The verification of a keyed-hash message authentication code. 3. The generation of a digital signature on a message. 4. The verification of a digital signature.
Source(s):
NIST SP 800-107 Rev. 1 under Key

  A parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce the operation, while an entity without knowledge of the key cannot. Examples of the use of a key that are applicable to this Recommendation include: 1. The computation of a digital signature from data, and 2. The verification of a digital signature.
Source(s):
NIST SP 800-89 under Key

  A cryptographic key. In this document, keys generally refer to public key cryptography key pairs used for authentication of users and/or machines (using digital signatures). Examples include identity key and authorized keys. The SSH protocol also uses host keys that are used for authenticating SSH servers to SSH clients connecting them.
Source(s):
NISTIR 7966 under Key