Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

ITL Bulletin

Secure Management of Keys in Cryptographic Applications: Guidance for Organizations

Date Published: February 2010

Author(s)

Shirley Radack (NIST)

Abstract

Keywords

authentication; authorization; availability; certification; confidentiality; cryptographic key; cryptographic module; cryptography; data integrity; digital signature; encryption; information security; information systems security; key management; private key; public key; public key infrastructure; security plan; validation
Control Families

None selected

Documentation

Publication:
February 2010 ITL Bulletin

Supplemental Material:
None available