scispace - formally typeset
Open AccessReportDOI

Recommendation for Key Management, Part 1: General (Revision 3)

Reads0
Chats0
TLDR
This Recommendation provides cryptographic key management guidance on policy and security planning requirements for U.S. government agencies and best practices for the management of cryptographic keying material.
Abstract
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

Intel SGX Explained.

TL;DR: In this article, the authors present a detailed and structured presentation of the publicly available information on SGX, a series of intelligent guesses about some important but undocumented aspects of SGX.
Journal Article

Advanced Encryption Standard (AES).

TL;DR: Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) with einer Schlüssellänge von 128 bit zum Sicherheitsrisiko, und zuletzt konnte 1998 mit einem von der „Electronic Frontier Foundation“ (EFF) entwickkelten Spezialmaschine mit 1.800 parallel arbeit
Proceedings ArticleDOI

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

TL;DR: Logjam, a novel flaw in TLS that lets a man-in-the-middle downgrade connections to "export-grade" Diffie-Hellman, is presented and a close reading of published NSA leaks shows that the agency's attacks on VPNs are consistent with having achieved a break.
Proceedings ArticleDOI

PeerReview: practical accountability for distributed systems

TL;DR: It is demonstrated that PeerReview is practical by applying it to three different types of distributed systems: a network filesystem, a peer-to-peer system, and an overlay multicast system.
Journal ArticleDOI

Smart Cities: A Survey on Data Management, Security, and Enabling Technologies

TL;DR: The fundamental data management techniques employed to ensure consistency, interoperability, granularity, and reusability of the data generated by the underlying IoT for smart cities are described.
References
More filters
Journal ArticleDOI

The Elliptic Curve Digital Signature Algorithm (ECDSA)

TL;DR: The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
Journal Article

Advanced Encryption Standard (AES).

TL;DR: Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) with einer Schlüssellänge von 128 bit zum Sicherheitsrisiko, und zuletzt konnte 1998 mit einem von der „Electronic Frontier Foundation“ (EFF) entwickkelten Spezialmaschine mit 1.800 parallel arbeit
Book

Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography

TL;DR: This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-QuVanstone key establishment schemes.
Book

Guide for the Security Certification And Accreditation of Federal Information Systems

TL;DR: This guideline has been prepared for use by federal agencies and is consistent with the requirements of the FISMA, but such standards and guidelines shall not apply to national security systems.

Guideline for Implementing Cryptography in the Federal Government | NIST

Annabelle Lee
TL;DR: This document focuses on Federal standards documented in Federal Information Processing Standards Publications (FIPS PUBs) and the cryptographic modules and algorithms that are validated against these standards.