Back to Results
First PageMeta Content
Cryptography standards / Key Wrap / Block cipher / Triple DES / Advanced Encryption Standard / Authenticated encryption / Key management / FIPS 140-2 / NSA Suite B Cryptography / Cryptography / Data Encryption Standard / Block cipher modes of operation


Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping (SP 800-38F)
Add to Reading List

Document Date: 2013-01-10 14:24:21


Open Document

File Size: 282,48 KB

Share Result on Facebook

Company

Accredited Standards Committee X9 Inc. / the AES / /

Country

United States / /

Event

FDA Phase / /

Facility

Tim Hall / National Institute of Standards and Technology / Information Security Technology The Information Technology Laboratory / /

IndustryTerm

standards infrastructure / information technology / security systems / federal information systems / encryption algorithm / legacy applications / /

Organization

National Institute of Standards and Technology / Telecommunications Industry Association / Internet Engineering Task Force / Institute of Standards and Technology Gaithersburg / Information Technology Laboratory / OMB / Institute of Standards and Technology Patrick D. Gallagher / NIST’s Computer Security Resource Center / U.S. Department of Commerce Rebecca / /

Person

Allen Roginsky / John Kelsey / Lily Chen / Tim Polk / Morris Dworkin / Sharon Keller / Patrick D. Gallagher / Elaine Barker / Phillip Rogaway / Heather Pearce / /

Position

author / Director NIST / Acting Secretary / Secretary of Commerce / Director / Acknowledgements The author / Secretary of Commerce under statutory authority / federal official / /

Product

Digital Radio Over / /

ProgrammingLanguage

BASIC / R / C / /

ProvinceOrState

Maryland / /

PublishedMedium

Public Law / /

Technology

encryption / cryptography / encryption algorithm / Information Technology / Block Cipher / key-wrap algorithms / ten numbered algorithms / /

SocialTag