Recommendation for Cryptographic Key Generation

Recommendation for Cryptographic Key Generation

Auteur : Elaine Barker

Date de publication : 2019

Éditeur : U.S. Department of Commerce, National Institute of Standards and Technology

Nombre de pages : 26

Résumé du livre

Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.

Connexion / Inscription

Saisissez votre e-mail pour vous connecter ou créer un compte

Connexion

Inscription

Mot de passe oublié ?

Nous allons vous envoyer un message pour vous permettre de vous connecter.