We love eBooks
    Download Recommendations for Cryptographic Key Management pdf, epub, ebook

    This site is safe

    You are at a security, SSL-enabled, site. All our eBooks sources are constantly verified.

    Recommendations for Cryptographic Key Management

    By Elaine Barker

    What do you think about this eBook?

    About

    Users and developers are presented with many choices in their use of cryptographic mechanisms. Inappropriate choices may result in an illusion of security, but little or no real security for the protocol or application. The security of information protected by cryptography directly depends on the strength of the keys, the effectiveness of mechanisms and protocols associated with keys, and the protection afforded to the keys.
    All keys need to be protected against modification, and secret and private keys need to be protected against unauthorized disclosure.

    Key management provides the foundation for the secure generation, storage, distribution, and destruction of keys. This report provides background information and establishes frameworks to support appropriate decisions when selecting and using cryptographic mechanisms. It is intended to advise developers and system administrators on the "best practices" associated with key management. This is the National Institute of Standards and Technology's Special Publication 800-57, published in 2007, at 142 pages. The content is in the public domain.
    Download eBook Link updated in 2017
    Maybe you will be redirected to source's website
    Thank you and welcome to our newsletter list! Ops, you're already in our list.

    Related to this eBook

    Browse collections

    Keep connected to us

    Follow us on Social Media or subscribe to our newsletter to keep updated about eBooks world.

    Explore eBooks

    Browse all eBook collections

    Collections is the easy way to explore our eBook directory.