Recommendation for Key Management: Part 1 – General

This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may be provided when using cryptography and the algorithms and key types that may be employed, specifications of the protection that each type of key and other cryptographic information requires and methods for providing this protection, discussions about the functions involved in key management, and discussions about a variety of key-management issues to be addressed when using cryptography. Part 2 provides guidance on policy and security planning requirements for U.S. Government agencies. Part 3 provides guidance when using the cryptographic features of current systems.

This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may be provided when using cryptography and the. See full abstract

This Recommendation provides cryptographic key-management guidance. It consists of three parts. Part 1 provides general guidance and best practices for the management of cryptographic keying material, including definitions of the security services that may be provided when using cryptography and the algorithms and key types that may be employed, specifications of the protection that each type of key and other cryptographic information requires and methods for providing this protection, discussions about the functions involved in key management, and discussions about a variety of key-management issues to be addressed when using cryptography. Part 2 provides guidance on policy and security planning requirements for U.S. Government agencies. Part 3 provides guidance when using the cryptographic features of current systems.

Keywords

archive ; assurances ; authentication ; authorization ; availability ; backup ; compromise ; confidentiality ; cryptanalysis ; cryptographic key ; cryptographic module ; digital signature ; hash function ; key agreement ; key information ; key-inventory management ; key management ; key management policy ; key recovery ; key transport ; originator-usage period ; private key ; public key ; recipient-usage period ; secret key ; split knowledge ; trust anchor

Control Families

Access Control ; Audit and Accountability ; Contingency Planning ; Media Protection ; Planning ; System and Communications Protection ; System and Information Integrity

Documentation

Supplemental Material:
None available

Document History:
10/08/19: SP 800-57 Part 1 Rev. 5 (Draft)
05/04/20: SP 800-57 Part 1 Rev. 5 (Final)