Recommendation for cryptographic key generation

Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.

[1]  Of references. , 1966, JAMA.

[2]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[3]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[4]  Elaine B. Barker,et al.  The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .

[5]  William C. Barker,et al.  TECHNOLOGY ADMINISTRATION , 2004 .

[6]  Morris J. Dworkin,et al.  SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .

[7]  Elaine B. Barker,et al.  Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography , 2007 .

[8]  Elaine B. Barker,et al.  Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2007 .

[9]  Lidong Chen,et al.  Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .

[10]  Quynh H. Dang,et al.  Recommendation for Applications Using Approved Hash Algorithms , 2009 .

[11]  William E. Burr,et al.  Recommendation for Password-Based Key Derivation Part 1: Storage Applications , 2010 .

[12]  Quynh H. Dang,et al.  Recommendation for Existing Application-Specific Key Derivation Functions , 2010 .

[13]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .

[14]  Sedat Akleylek,et al.  Security requirements for cryptographic modules , 2013 .

[15]  John Kelsey,et al.  Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .

[16]  Elaine B. Barker Recommendation for Key Management - Part 1 General , 2014 .

[17]  Shu-jen H. Chang,et al.  SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash , 2016 .

[18]  John Kelsey,et al.  Recommendation for Random Bit Generator (RBG) Constructions , 2016 .

[19]  John Kelsey,et al.  Recommendation for the Entropy Sources Used for Random Bit Generation , 2018 .

[20]  Elaine B. Barker,et al.  Recommendation for Key Establishment Using Symmetric Block Ciphers , 2018 .

[21]  Elaine B. Barker,et al.  Recommendation for Key-Derivation Methods in Key-Establishment Schemes , 2018 .

[22]  Elaine B. Barker,et al.  Transitioning the use of cryptographic algorithms and key lengths , 2011 .

[23]  Elaine B. Barker,et al.  Recommendation for pair-wise key establishment using integer factorization cryptography , 2019 .