Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

key transport

Abbreviation(s) and Synonym(s):

Key distribution

Definition(s):

  See Key transport.
Source(s):
NIST SP 800-152 under Key distribution

  The transport of a key and other keying material from an entity that either owns or generates the key to another entity that is intended to use the key.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Key distribution [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Key distribution

  A key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver). Contrast with key agreement.
Source(s):
NIST SP 800-56B Rev. 1 under Key transport

  A key-establishment procedure whereby one party (the sender) selects a value for the secret keying material and then securely distributes that value to another party (the receiver) using an asymmetric algorithm.
Source(s):
NIST SP 800-133 under Key transport

  A manual or automated key-establishment procedure whereby one entity (the sender) selects and distributes the key to another entity (the receiver).
Source(s):
NIST SP 800-152 under Key transport

  A key-establishment procedure whereby one party (the sender) selects and encrypts (or wraps) the keying material and then distributes the material to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the keying material is encrypted using the public key of the receiver and subsequently decrypted using the private key of the receiver. When used in conjunction with a symmetric algorithm, the keying material is encrypted with a key-wrapping key shared by the two parties.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Key transport

  A key-establishment procedure whereby one party (the sender) selects and encrypts the keying material and then distributes the material to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the keying material is encrypted using the public key of the receiver and subsequently decrypted using the private key of the receiver. When used in conjunction with a symmetric algorithm, the keying material is encrypted with a key-encrypting key shared by the two parties.
Source(s):
CNSSI 4009-2015 (NIST SP 800-57 Part 1 Rev. 3)

  A key-establishment procedure whereby one party (the sender) selects and encrypts the keying material and then distributes the material to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the keying material is encrypted using the public key of the receiver and subsequently decrypted using the private key of the receiver. When used in conjunction with a symmetric algorithm, the keying material is encrypted with a key-encrypting key shared by the two parties.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Key transport [Superseded]

  Secure transport of cryptographic keys from one cryptographic module to another module. When used in conjunction with a public key (asymmetric) algorithm, keying material is encrypted using a public key and subsequently decrypted using a private key. When used in conjunction with a symmetric algorithm, key transport is known as key wrapping.
Source(s):
NIST SP 800-57 Part 2 under Key transport