A symmetric key used with a key-wrapping algorithm to protect keying material. In accordance with this Recommendation (SP 800-56B), a key-wrapping key can be established using a KAS1, KAS2 or KTS-OAEP scheme and then used with a key-wrapping algorithm to protect transported keying material. (See Section 9.3.)
Sources:
NIST SP 800-56B Rev. 2
A symmetric key that is used with a key-wrapping algorithm to protect the confidentiality and integrity of keys.
Sources:
NIST SP 800-57 Part 2 Rev.1
under Key wrapping key
A symmetric key used to provide confidentiality and integrity protection for other keys.
Sources:
NIST SP 800-175B Rev. 1
A symmetric key that is used to provide both confidentiality and integrity protection for other keys. Also see Key-encrypting key.
Sources:
NIST SP 800-57 Part 1 Rev. 5
A key used as an input to a key-wrapping method; see SP 800-38F.
Sources:
NIST SP 800-133 Rev. 2