Fandom

The IT Law Wiki

Recommendation for Key Management

32,181pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Overview Edit

NIST, Recommendation for Key Management (NIST Special Publication 800-57) (Mar. 2007) (full-text).

Overview Edit

The publication provides detailed information on key management planning, algorithm selection and appropriate key sizes, cryptographic policy, and cryptographic module selection. Organizations may be able to use the same or similar key management processes for end user devices' storage encryption, virtual private network (VPN) clients, and wireless client configuration.

This document includes the protocol-specific guidance for protocols such as Internet Protocol Security (IPSec), Transport Layer Security Secure/Multipurpose Internet Mail Extensions (S/MIME), Kerberos, Over-the-Air Rekeying and Domain Name System Security Extensions (DNSSEC). It also contains guidance on using PKI and Encrypted File Systems.

Also on Fandom

Random Wiki