U. S. Department of Commerce Elaine Barker William Barker
Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
Special Publication 800-57 provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best pract...
National Institute of Standards and Tech Elaine Barker Don Johnson
This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards developed by the Accredited Standards Committee (ASC) X9, Inc.: ANS X9.42 (Agreement of Symmetric Keys Using Discrete Logarithm Cryptography) and ANS X9.63 (Key Agreement and Key Transport Using Elliptic Curve Cryptography).
This Recommendation specifies key establishment schemes using discrete logarithm cryptography, based on standards developed by the Accredited Standard...
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices fo...
This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash functions, block cipher algorithms or number theoretic problems.
This Recommendation specifies mechanisms for the generation of random bits using deterministic methods. The methods provided are based on either hash ...