Date Published: March 2020
Email Comments to:
This draft of SP 800-133 Revision 2 discusses the generation of the keys to be managed and used by the approved cryptographic algorithms, and it provides a method for determining a symmetric key by combining multiple keys and other data.
NOTE: A call for patent claims is included on page iii of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.
Keywords asymmetric key; key agreement; key derivation; key generation; key wrapping; key replacement; key transport; private key; public key; symmetric key