Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-131A Rev. 2

Transitioning the Use of Cryptographic Algorithms and Key Lengths

Date Published: March 2019

Supersedes: SP 800-131A Rev. 1 (11/06/2015)

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST)

Abstract

Keywords

cryptographic algorithm; digital signatures; encryption; hash function; key agreement; key derivation functions; key management; key transport; key wrapping; message authentication codes; post-quantum algorithms; random number generation; security strength; transition
Control Families

System and Information Integrity; System and Communications Protection;

Documentation

Publication:
SP 800-131A Rev. 2 (DOI)
Local Download

Supplemental Material:
Comments received on Draft SP 800-131A Rev. 2 (pdf)

Related NIST Publications:
SP 800-57 Part 1 Rev. 4

Document History:
07/19/18: SP 800-131A Rev. 2 (Draft)
03/21/19: SP 800-131A Rev. 2 (Final)

Topics

Security and Privacy
key management