The National Institute of Standards and Technology (NIST) provides cryptographic key management guidance for defining and implementing appropriate key management procedures, using algorithms that adequately protect sensitive information, and planning ahead for possible changes in the use of cryptography because of algorithm breaks or the availability of more powerful computing techniques. NIST Special Publication (SP) 80057, Part 1, Recommendation for Key Management: General, includes a general approach for transitioning from one algorithm or key length to another. This Recommendation (SP 800-131A) provides more specific guidance for transitions to the use of stronger cryptographic keys and more robust algorithms.
[1]
John Kelsey,et al.
Recommendation for Random Number Generation Using Deterministic Random Bit Generators
,
2014
.
[2]
Elaine B. Barker,et al.
Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography | NIST
,
2009
.
[3]
William C. Barker,et al.
TECHNOLOGY ADMINISTRATION
,
2004
.
[4]
Lidong Chen,et al.
Recommendation for Key Derivation Using Pseudorandom Functions (Revised)
,
2009
.
[5]
Shu-jen H. Chang,et al.
SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash
,
2016
.