Recommendation for Key Management, Part 1: General (Revision 3)
Reads0
Chats0
TLDR
This Recommendation provides cryptographic key management guidance on policy and security planning requirements for U.S. government agencies and best practices for the management of cryptographic keying material.Abstract:
This Recommendation provides cryptographic key management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material. Part 2 provides guidance on policy and security planning requirements for U.S. government agencies. Finally, Part 3 provides guidance when using the cryptographic features of current systems.read more
Citations
More filters
Posted Content
Intel SGX Explained.
Victor Costan,Srinivas Devadas +1 more
TL;DR: In this article, the authors present a detailed and structured presentation of the publicly available information on SGX, a series of intelligent guesses about some important but undocumented aspects of SGX.
Journal Article
Advanced Encryption Standard (AES).
TL;DR: Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) with einer Schlüssellänge von 128 bit zum Sicherheitsrisiko, und zuletzt konnte 1998 mit einem von der „Electronic Frontier Foundation“ (EFF) entwickkelten Spezialmaschine mit 1.800 parallel arbeit
Proceedings ArticleDOI
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
David Adrian,Karthikeyan Bhargavan,Zakir Durumeric,Pierrick Gaudry,Matthew Green,J. Alex Halderman,Nadia Heninger,Drew Springall,Emmanuel Thomé,Luke Valenta,Benjamin VanderSloot,Eric Wustrow,Santiago Zanella-Béguelin,Paul Zimmermann +13 more
TL;DR: Logjam, a novel flaw in TLS that lets a man-in-the-middle downgrade connections to "export-grade" Diffie-Hellman, is presented and a close reading of published NSA leaks shows that the agency's attacks on VPNs are consistent with having achieved a break.
Proceedings ArticleDOI
PeerReview: practical accountability for distributed systems
TL;DR: It is demonstrated that PeerReview is practical by applying it to three different types of distributed systems: a network filesystem, a peer-to-peer system, and an overlay multicast system.
Journal ArticleDOI
Smart Cities: A Survey on Data Management, Security, and Enabling Technologies
Ammar Gharaibeh,Mohammad A. Salahuddin,Sayed Jahed Hussini,Abdallah Khreishah,Issa Khalil,Mohsen Guizani,Ala Al-Fuqaha +6 more
TL;DR: The fundamental data management techniques employed to ensure consistency, interoperability, granularity, and reusability of the data generated by the underlying IoT for smart cities are described.
References
More filters
Journal ArticleDOI
The Elliptic Curve Digital Signature Algorithm (ECDSA)
TL;DR: The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
Journal Article
Advanced Encryption Standard (AES).
TL;DR: Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) with einer Schlüssellänge von 128 bit zum Sicherheitsrisiko, und zuletzt konnte 1998 mit einem von der „Electronic Frontier Foundation“ (EFF) entwickkelten Spezialmaschine mit 1.800 parallel arbeit
Book
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
TL;DR: This Recommendation specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman and Menezes-QuVanstone key establishment schemes.
Book
Guide for the Security Certification And Accreditation of Federal Information Systems
TL;DR: This guideline has been prepared for use by federal agencies and is consistent with the requirements of the FISMA, but such standards and guidelines shall not apply to national security systems.
Guideline for Implementing Cryptography in the Federal Government | NIST
TL;DR: This document focuses on Federal standards documented in Federal Information Processing Standards Publications (FIPS PUBs) and the cryptographic modules and algorithms that are validated against these standards.