Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

ITL Bulletin December 2012

Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information

Date Published: December 2012

Author(s)

Shirley Radack (NIST)

Abstract

Keywords

asymmetric keys; authentication; cryptographic keys; cryptographic modules; cyber security; decryption; encryption; information security; information systems; key generation; key management; public keys; private keys; random bit generation; security management; symmetric keys; security requirements; security risks
Control Families

None selected

Documentation

Publication:
December 2012 ITL Bulletin

Supplemental Material:
None available

Topics

Security and Privacy
cryptography