Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Key Management

Key Establishment

The following publications specify methods for establishing cryptographic keys.

 

Pair-Wise Key Establishment Schemes

  • SP 800-56A, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
  • SP 800-56B, Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography

Key Derivation

  • SP 800-56C, Recommendation for Key Derivation Methods in Key-Establishment Schemes
  • SP 800-108, Recommendation for Key Derivation Using Pseudorandom Functions

Key Generation

  • SP 800-133, Recommendation for Cryptographic Key Generation

Key Wrapping

  • SP 800-38F, Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping

Transitions for Key Derivation Functions

  • SP 800-135, Transitions: Recommendation for Existing Application-Specific Key Derivation Functions

Created January 04, 2017, Updated February 12, 2018