Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Cryptography relies upon two basic components: an algorithm (or cryptographic methodology) and a cryptographic key. This Recommendation discusses the generation of the keys to be managed and used by the approved cryptographic algorithms.
| Author: U. S. Department of Commerce |
| Publisher: Createspace Independent Publishing Platform |
| Publication Date: Oct 09, 2014 |
| Number of Pages: 28 pages |
| Binding: Paperback or Softback |
| ISBN-10: 1502473399 |
| ISBN-13: 9781502473394 |