Date Published: July 2018
Comments Due:
Email Questions to:
Author(s)
Elaine Barker (NIST), William Barker (Dakota Consulting)
Announcement
Draft NIST Special Publication (SP) 800-71, Recommendations for Key Establishment Using Symmetric Block Ciphers, addresses key establishment techniques that use symmetric key cryptography algorithms to protect symmetric keying material. The objective is to provide recommendations for reducing exposure to the unauthorized disclosure of the keying material and detecting its unauthorized modification, substitution, insertion or deletion. The Recommendation also addresses recovery in the event of detectable errors during the key-distribution process. Wrapping mechanisms are specified for encrypting keys, binding key control information to the keys and protecting the integrity of this information.
This recommendation addresses the protection of symmetric keying material during a key establishment that uses symmetric-key cryptography for key distribution. The objective is to provide recommendations for reducing exposure to the unauthorized disclosure of the keying material and detecting its unauthorized modification, substitution, insertion or deletion. The Recommendation also addresses recovery in the event of detectable errors during the key-distribution process. Wrapping mechanisms are specified for encrypting keys, binding key control information to the keys and protecting the integrity of this information.
This recommendation addresses the protection of symmetric keying material during a key establishment that uses symmetric-key cryptography for key distribution. The objective is to provide recommendations for reducing exposure to the unauthorized disclosure of the keying material and detecting its...
See full abstract
This recommendation addresses the protection of symmetric keying material during a key establishment that uses symmetric-key cryptography for key distribution. The objective is to provide recommendations for reducing exposure to the unauthorized disclosure of the keying material and detecting its unauthorized modification, substitution, insertion or deletion. The Recommendation also addresses recovery in the event of detectable errors during the key-distribution process. Wrapping mechanisms are specified for encrypting keys, binding key control information to the keys and protecting the integrity of this information.
Hide full abstract
Keywords
algorithm; authentication; block cipher; key distribution; key establishment; key generation; key management; key translation; key wrapping; message authentication code; symmetric key
Control Families
System and Communications Protection; System and Information Integrity