Cryptography is tantamount to cyber-securing an information technology environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. The loss or manipulation of such data could affect a business’s profitability, reveal personally identifiable information, or in some extreme cases, jeopardize national security.
Cryptography relies on two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. Special Publication Revision 2 discusses the generation of the keys to be managed and used by the approved cryptographic algorithms, NIST said in a release.
SP 800-133 Revision 2, Recommendation for Cryptographic Key Generation, which discusses the generation of the keys to be managed and used by the approved cryptographic algorithms. This revision provides a method for determining a symmetric key by combining multiple keys and other data.
The National Institute of Standards and Technology is requesting comments to be submitted by April 17, 2020. Please email comments to firstname.lastname@example.org.