Back to Results
First PageMeta Content
Symmetric-key algorithm / Public-key cryptography / FIPS 140-2 / Cryptographic protocol / Cryptoperiod / Digital signature / Cryptographic key types / CRYPTREC / Cryptography / Key management / Key


Recommendation for Cryptographic Key Generation
Add to Reading List

Document Date: 2013-04-17 09:08:42


Open Document

File Size: 289,92 KB

Share Result on Facebook

Country

United States / /

/

Facility

Computer Systems Technology The Information Technology Laboratory / National Institute of Standards and Technology / Information Technology Laboratory / Acknowledgements The National Institute of Standards and Technology / National Institute of Standards and Technology Attn / /

IndustryTerm

mathematical processing / asymmetric algorithm / standards infrastructure / primitive algorithm / cryptographic algorithms / information technology / public-key algorithm / security systems / cryptographic algorithm / information technology security environment / /

Organization

National Institute of Standards and Technology / Cryptographic Key Generation Elaine Barker Allen Roginsky Computer Security Division Information Technology Laboratory / Federal government / National Security Agency / Computer Security Division / NIST Computer Security Division / Information Technology Laboratory / OMB / Department of Commerce / Institute of Standards and Technology Attn / Institute of Standards and Technology Patrick D. Gallagher / Institute of Standards and Technology Special Publication / /

Person

Elaine Barker Allen Roginsky / Patrick D. Gallagher / Rebecca Blank / /

/

Position

Acting Secretary / Director / Secretary of Commerce / Director / Secretary of Commerce under statutory authority / General / Under Secretary of Commerce / federal official / /

ProgrammingLanguage

R / C / /

ProvinceOrState

Maryland / /

PublishedMedium

Public Law / /

Technology

Encryption / public-key algorithm / asymmetric algorithm / Cryptography / public key / Information Technology / private key / approved cryptographic algorithms / Digital Signature / cryptographic algorithm / Asymmetric-key algorithm / /

URL

http /

SocialTag