2015
DOI: 10.6028/nist.sp.800-57pt3r1
|View full text |Cite
|
Sign up to set email alerts
|

Recommendation for Key Management Part 3: Application-Specific Key Management Guidance

Abstract: This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(32 citation statements)
references
References 0 publications
0
32
0
Order By: Relevance
“…The National Institute of Standards and Technology (NIST), that issues guidelines for the US federal government, disallows use of 1024-bit keys beyond 2014 [6]. But that NIST makes an exemption for DNSSEC until October 2015 "due to message size constraints [fragmentation]" is telling ( [7], §8.1.3).…”
Section: Rsa: the Root Cause?mentioning
confidence: 99%
See 1 more Smart Citation
“…The National Institute of Standards and Technology (NIST), that issues guidelines for the US federal government, disallows use of 1024-bit keys beyond 2014 [6]. But that NIST makes an exemption for DNSSEC until October 2015 "due to message size constraints [fragmentation]" is telling ( [7], §8.1.3).…”
Section: Rsa: the Root Cause?mentioning
confidence: 99%
“…The table lists the number of times verification under the ECC scheme is slower than the RSA scheme. Values are based on the arithmetic average over the median number of CPU cycles for four recent CPU types7 . Tab.…”
mentioning
confidence: 99%
“…The FIPS 140 validation certificate for the cryptographic module used by the server shall indicate that the random bit generator (RBG) has been validated in accordance with the SP 800-90 series [8,48,66]. 22 The server random value, sent in the ServerHello message, contains a 4-byte timestamp 23 value and 28-byte random value in TLS versions 1.0, 1.1, and 1.2, and contains a 32-byte random value in TLS 1.3. The validated random number generator shall be used to generate the random bytes of the server random value.…”
Section: Validated Cryptographymentioning
confidence: 99%
“…For example, the Heartbleed bug [70] was a flaw in an implementation of the heartbeat extension [64]. Although the extension has no 22 Validation will include compliance with SP 800-90C once it is available. 23 The timestamp value does not need to be correct in TLS.…”
Section: Tls Extension Supportmentioning
confidence: 99%
“…Although a number of key management techniques have been submitted to the scrutiny of experts and follow industry standards such as ISO [22], ANSI [23], and NIST [24]- [26], many key management applications that contain their own unique proprietary protocols with the aim of avoiding issues relating to incompatibility have been proposed.…”
Section: Architecture Of Secure Key Managementmentioning
confidence: 99%