Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

key establishment

Definitions:

  A function in the lifecycle of keying material; the process by which cryptographic keys are securely established among cryptographic modules using manual transport methods (e.g., key loaders), automated methods (e.g., key-transport and/or key-agreement protocols), or a combination of automated and manual methods (consists of key transport plus key agreement).
Sources:
CNSSI 4009-2015

  A procedure that results in secret keying material that is shared among different parties.
Sources:
NIST SP 800-133 Rev. 2 under Key establishment
NIST SP 800-56C Rev. 2 under Key establishment

  The process that results in the sharing of a key between two or more entities, either by transporting a key from one entity to another (key transport) or generating a key from information shared by the entities (key agreement).
Sources:
NIST SP 800-152 under Key establishment

  A procedure that results in establishing secret keying material that is shared among different parties.
Sources:
NIST SP 800-56B Rev. 2 under Key establishment

  The process that results in the sharing of a key between two or more entities, either by manual distribution, using automated key transport or key agreement mechanisms or by using key derivation that employs an already-shared key between or among those entities. Key establishment may include the creation of a key.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Key establishment

  The procedure that results in keying material that is shared among different entities.
Sources:
NIST SP 800-175B Rev. 1 under Key establishment

  A function in the lifecycle of a cryptographic key; the process by which cryptographic keys are securely established among entities using manual transport methods (e.g., key loaders), automated methods (e.g., key-transport and/or key-agreement protocols), or a combination of automated and manual methods.
Sources:
NIST SP 800-57 Part 1 Rev. 5 under Key establishment

  A procedure conducted by two or more participants, after which the resultant keying material is shared by all participants.
Sources:
NIST SP 800-108r1 [August 2022 (Includes updates as of 02-02-2024)]