Produce, control, and distribute symmetric cryptographic keys using NIST FIPS-validated; NSA-approved key management technology and processes.
SP 800-56A, SP 800-56B , and SP 800-56C provide guidance on cryptographic key establishment schemes and key derivation methods. SP 800-57-1, SP 800-57-2 , and SP 800-57-3 provide guidance on cryptographic key management.
symmetric cryptographic keys are produced using NIST FIPS-validated; NSA-approved key management technology and processes; symmetric cryptographic keys are controlled using NIST FIPS-validated; NSA-approved key management technology and processes; symmetric cryptographic keys are distributed using NIST FIPS-validated; NSA-approved key management technology and processes.
No cross-framework mappings available