Key Distribution

/ 0 comments

Get Certified Get Ahead

The transport of a key and other keying material from an entity that either owns or generates the key to another entity that is intended to use the key. 

See NIST SP 800-57 Part 1 Rev. 4 under Key distribution for more information. 
 
A manual or automated key-establishment procedure whereby one entity (the sender) selects and distributes the key to another entity (the receiver). 

See NIST SP 800-152 under Key transport for more information. 
 
Secure transport of cryptographic keys from one cryptographic module to another module. When used in conjunction with a public key (asymmetric) algorithm, keying material is encrypted using a public key and subsequently decrypted using a private key. When used in conjunction with a symmetric algorithm, key transport is known as key wrapping. 

See NIST SP 800-57 Part 2 under Key transport for more information. 
 
The transport of a key and other keying material from an entity that either owns the key or generates the key to another entity that is intended to use the key. 
 
See the following under Distribution for more information: 
NIST SP 800-57 Part 1 Rev. 4
NIST SP 800-57 Part 2
NIST SP 800-57 Part 2 Rev.1
 
The transport of key information from one entity (the sender) to one or more other entities (the receivers). The sender may have generated the key information or acquired it from another source as part of a separate process. The key information may be distributed manually or using automated key transport mechanisms. 

See NIST SP 800-57 Part 2 Rev.1 under Key distribution for more information. 
 
A key-establishment procedure whereby one party (the sender) selects and encrypts (or wraps) the keying material and then distributes the material to another party (the receiver). When used in conjunction with a public-key (asymmetric) algorithm, the keying material is encrypted using the public key of the receiver and subsequently decrypted using the private key of the receiver. When used in conjunction with a symmetric algorithm, the keying material is encrypted with a key-wrapping key shared by the two parties. 

See NIST SP 800-57 Part 1 Rev. 4 under Key transport for more information.

Share this Post

Leave a Comment

Your email address will not be published. Required fields are marked *

*
*