Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-131A

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Date Published: January 2011

Supersedes: SP 800-131 (06/16/2010)

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST)

Abstract

Keywords

Cryptographic algorithm; digital signatures; encryption; hash function; key agreement; key derivation; key management; key transport; key wrapping; message authentication codes; random number generation; security strength; transition.
Control Families

None selected

Documentation

Publication:
SP 800-131A (DOI)
Local Download

Supplemental Material:
None available