Security

The Transitioning of Cryptographic Algorithms and Key Sizes

Free registration required

Executive Summary

At the beginning of the century, NIST began the task of providing cryptographic key management guidance. This included lessons learned over many years of dealing with key management issues, and attempts to encourage the definition and implementation of appropriate key management procedures, to use algorithms that adequately protect sensitive information, and to plan ahead for possible changes in the use of cryptography because of algorithm breaks or the availability of more powerful computing techniques. This paper is provided in NIST Special Publication (SP) 800-57.

  • Format: PDF
  • Size: 187.3 KB