A parameter used in conjunction with a cryptographic algorithm that determines its operation.
Examples applicable to this Standard include:
1. The computation of a digital signature from data, and
2. The verification of a digital signature.
Sources:
FIPS 186-5
under Key
NIST SP 800-12 Rev. 1
under Key
A parameter used in conjunction with a cryptographic algorithm that determines the specific operation of that algorithm.
Sources:
FIPS 201-3
under Cryptographic Key
The parameter of a block cipher that determines the selection of a permutation from the block cipher family.
Sources:
FIPS 197
[NIST FIPS 197-upd1]
under Key
A bit string that is used in conjunction with a cryptographic algorithm, such as the encapsulation and decapsulation keys (of a KEM), the shared secret key (produced by a KEM), and the encryption and decryption keys (of a PKE).
Sources:
FIPS 203
A parameter used in conjunction with a cryptographic algorithm that determines its operation. Examples of cryptographic algorithms applicable to this standard include:
1. The computation of a digital signature from data
2. The verification of a digital signature
A parameter used in conjunction with a cryptographic algorithm that deter-mines its operation. Examples of cryptographic algorithms applicable to this standard include:
1. The computation of a digital signature from data
2. The verification of a digital signature