Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-133 Rev. 2(Draft)

Recommendation for Cryptographic Key Generation

Date Published: March 2020
Comments Due: April 17, 2020
Email Comments to: sp-800-133_comments@nist.gov

Author(s)

Elaine Barker (NIST), Allen Roginsky (NIST), Richard Davis (NSA)

Announcement

This draft of SP 800-133 Revision 2 discusses the generation of the keys to be managed and used by the approved cryptographic algorithms, and it provides a method for determining a symmetric key by combining multiple keys and other data.

NOTE: A call for patent claims is included on page iii of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.

Abstract

Keywords

asymmetric key; key agreement; key derivation; key generation; key wrapping; key replacement; key transport; private key; public key; symmetric key
Control Families

None selected

Documentation

Publication:
SP 800-133 Rev. 2 (Draft) (DOI)
Local Download

Supplemental Material:
None available

Topics

Security and Privacy
key management