Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-131A

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Date Published: January 2011

Withdrawn: November 06, 2015

Superseded By: SP 800-131A Rev. 1 (November 2015)
Supersedes: SP 800-131 (June 16, 2010)

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST)

Abstract

Keywords

Cryptographic algorithm; digital signatures; encryption; hash function; key agreement; key derivation; key management; key transport; key wrapping; message authentication codes; random number generation; security strength; transition.
Control Families

None selected

Documentation

Publication:
SP 800-131A (DOI)
Local Download

Supplemental Material:
None available