Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

keying material

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Data that is represented as a binary string such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys. In this Recommendation, keying material is derived from a shared secret established during an execution of a key-establishment scheme or generated by the sender in a key-transport scheme. As used in this Recommendation, secret keying material may include keys, secret initialization vectors, and other secret parameters.
Source(s):
NIST SP 800-56A Rev. 2 under Keying material

  Data that is represented as a binary string such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys. In this Recommendation, keying material is derived from a shared secret established during an execution of a key-agreement scheme, or transported by the sender in a key-transport scheme. As used in this Recommendation, secret keying material may include keys, secret initialization vectors, and other secret parameters.
Source(s):
NIST SP 800-56B Rev. 1 under Keying material

  The data (e.g., keys and IVs) necessary to establish and maintain cryptographic keying relationships.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Keying material [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Keying material
NIST SP 800-57 Part 2 under Keying material

  Key, code, or authentication information in physical, electronic, or magnetic form. It includes key tapes and list, codes, authenticators, one-time pads, floppy disks, and magnetic tapes containing keys, plugs, keyed microcircuits, electronically generated key, etc.
Source(s):
CNSSI 4009-2015 (CNSSI 4005)

  A bit string, such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys and secret parameters, such as initialization vectors.
Source(s):
NIST SP 800-107 Rev. 1 under Keying Material

  A binary string, such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys.
Source(s):
NIST SP 800-108 under Keying material

  A binary string, such that any non-overlapping segments of the string with the required lengths can be used as symmetric cryptographic keys and secret parameters, such as initialization vectors.
Source(s):
NIST SP 800-56C under Keying material