An official website of the United States government
https://www.nist.gov/news-events/events/2012/09/cryptographic-key-management-workshop-2012
[画像:National Institute of Standards and Technology]NIST conducted a two-day Key Management Workshop on September 10-11. The subject of the workshop was the technical and administrative aspects of Cryptographic Key Management Systems (CKMSs) that existed at the time and what would be required for U.S. Federal use in the future. On the first day, DRAFT NIST Special Publication 800-130 ("A Framework for Designing CKMS") and DRAFT NIST Special Publication 800-152 ("A Profile for U.S. Federal CKMS") were reviewed and comments were solicited from the workshop participants on the DRAFT documents. The second day focused on CKMS capabilities in future security products and services in new U.S. Federal Information Systems. Input from Workshop participants was solicited regarding the utility and feasibility of these capabilities as well as suggestions for other technical capabilities required in future CKMSs.
*NEW!* Summary of the Workshop on Cryptographic Key Management Systems
Webcast
The event was webcast live September 10 and 11. The link to the webcast is no longer available.
Related: Cryptographic Key Management Project
Reference Documentation: Copies of NIST SP 800-130 and NIST SP 800-152 will not be available at the workshop. If you'd like to reference either document while at the workshop, please print a copy to bring along.
Monday, September 10, 2012
Welcome and administrative information – Elaine Barker, NIST
Tuesday, September 11, 2012
Welcome and Leap-ahead Inspirational Talk – Tim Polk, NIST
Call for Presentations
During the development of SP 800-130 (the Key Management Framework) and SP 800-152 (the Profile document), NIST identified a number of properties as particularly hard problems associated with secure Cryptographic Key Management Systems (CKMS). These problems include:
- Cryptographic
- Agility
- Scalability
- Anonymity
- Unlinkability
- Unobservability
- Usability
- Compromise recovery
- Multi-level security domains
- Negotiating and enforcing domain security policies, including a Policy Language for enabling negotiation and enforcement
- Interaction between domains, each with its own security policies
The second day of the workshop will focus on these and other hard problems. NIST requests the submission of abstracts for presentation about these and other problems associated with key management systems. These submissions should be no longer than two paragraphs in length and should be submitted to kmwquestions [at] nist.gov by August 6th.