More

    Generating Secure Cryptographic Keys: A Critical Component of Cryptographic Key Management and the Protection of Sensitive Information

    Generating Secure Cryptographic Keys

    Cryptographic methods can be used to maintain the confidentiality and integrity of information, verify that information was not changed after it was sent, and authenticate the originator of the information.

    Cyptography provides strong protection for information technology (IT) systems, applications and information, especially when information is sensitive, has a high value or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptographic methods can be used to maintain the confidentiality and integrity of information, verify that information was not changed after it was sent, and authenticate the originator of the information.

    This bulletin summarizes the information presented in NIST Special Publication (SP) 800-133, Recommendation for Cryptographic Key Generation.

    Use this detailed NIST document to help generate the cryptographic keys that are to be used with approved cryptographic algorithms to protect information and information systems.

    The attached zip file includes:

    • Intro Page.pdf
    • Terms and Conditions.pdf
    • Generating Secure Cryptographic Keys.pdf

    Get the Free Newsletter!

    Subscribe to Daily Tech Insider for top news, trends, and analysis.

    Latest Articles