Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

key management

Abbreviation(s) and Synonym(s):

None

Definition(s):

  The activities involved in the handling of cryptographic keys and other related security parameters (e.g., initialization vectors (IVs) and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and destruction.
Source(s):
NIST SP 800-56B Rev. 1 under Key management

  The activities involving the handling of cryptographic keys and other related security parameters (e.g., initialization vectors) during the entire lifecycle of the keys, including their generation, storage, establishment, entry and output, use and destruction.
Source(s):
NIST SP 800-12 Rev. 1 under Key Management (NIST SP 800-57 Part 1 Rev. 4)
NIST SP 800-57 Part 1 Rev. 4 under Key management

  The activities involving the handling of cryptographic keys and other related security parameters (e.g. passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and destruction.
Source(s):
CNSSI 4009-2015 (NIST SP 800-57 Part 1 Rev. 3)

  The activities involving the handling of cryptographic keys and other related security parameters (e.g., passwords) during the entire lifecycle of the keys, including their generation, storage, establishment, entry and output, use and destruction.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Key management [Superseded]

  The activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and destruction.
Source(s):
NIST SP 800-57 Part 2 under Key management