<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=NIST_SP_800-130</id>
	<title>NIST SP 800-130 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=NIST_SP_800-130"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=NIST_SP_800-130&amp;action=history"/>
	<updated>2026-05-04T11:53:18Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=NIST_SP_800-130&amp;diff=4822&amp;oldid=prev</id>
		<title>Omaerz: 2 revisions imported: Initial Upload of old pages from IDESG Wiki</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=NIST_SP_800-130&amp;diff=4822&amp;oldid=prev"/>
		<updated>2018-06-28T04:02:19Z</updated>

		<summary type="html">&lt;p&gt;2 revisions imported: Initial Upload of old pages from IDESG Wiki&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;Title&amp;#039;&amp;#039;&amp;#039;: A Framework for Designing Cryptographic Key Management Systems&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Category&amp;#039;&amp;#039;&amp;#039;: Security Control Implementation Guide&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Date&amp;#039;&amp;#039;&amp;#039;: 4/1/2012&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Creator&amp;#039;&amp;#039;&amp;#039;: NIST&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;URL&amp;#039;&amp;#039;&amp;#039;: http://csrc.nist.gov/publications/drafts/800-130/second-draft_sp-800-130_april-2012.pdf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;	&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Description&amp;#039;&amp;#039;&amp;#039;: A set of documentation requirements that can be used to express the design of a cryptographic key&lt;br /&gt;
management system (CKMS). The CKMS is the policies, procedures, components and devices that together&lt;br /&gt;
provide the functionality of the CKMS. As with IETF RFC 3647, this is not a design or set of functional&lt;br /&gt;
requirements, but a framework for specifying requirements. The scope of a CKMS includes protection of&lt;br /&gt;
both cryptographic keys as well as the metadata associated with those keys, such as the digital identity&lt;br /&gt;
associated with the key. The link between a key and selected metadata elements is called a trusted&lt;br /&gt;
association, a traditional example of such a trusted association would be an X.509 digital certificate, which&lt;br /&gt;
links the subject identity with their public key in a trusted fashion.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Privacy&amp;#039;&amp;#039;&amp;#039;: Contains functional requirements related to privacy, requiring the CKMS design to specify the support for the&lt;br /&gt;
anonymity, unlinkability and unobservability, when it is utilized and how it is technically achieved,&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Security&amp;#039;&amp;#039;&amp;#039;:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Interoperability&amp;#039;&amp;#039;&amp;#039;: The purpose of the document is to provide a common means of specifying the design of a CKMS.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Terms&amp;#039;&amp;#039;&amp;#039;: [[Active State]], [[Algorithm Transition]], [[Application]], [[Archive (key/metadata)]], [[Associated Metadata]], [[Association Function]], [[Audit]], [[Authoritative Time Source]], [[Backup (key/metadata)]], [[Cryptographic Key Management System]], [[CKMS Component]], [[CKMS Device]], [[CKMS Module]], [[CKMS Profile]], [[Commercial Off-the-shelf]], [[Compromise]], [[Compromised State]], [[Cryptanalyze]], [[Cryptographic Binding (binding)]], [[Cryptographic Boundary]], [[Cryptographic Key]], [[Cryptographic Key Management System]], [[Cryptographic Module]], [[Cryptographic Officer]], [[Cryptography]], [[Cryptoperiod]], [[Deactivated State]], [[Designer]], [[Destroyed State]], [[Destroyed Compromised State]], [[Security Domain]], [[Entity]], [[Extensibility]], [[Firewall]], [[Formal Language]], [[Framework]], [[Garbled]], [[Generate Key]], [[Hardening]], [[Hash Value]], [[Identifier]], [[Interoperability]], [[Key Agreement]], [[Key Confirmation]], [[Key Entry]], [[Key Establishment]], [[Key Label]], [[Key Life Cycle State]], [[Key Output]], [[Key Owner]], [[Key Split]], [[Key State Transition]], [[Key Transport]], [[Key Update]], [[Key Wrapping]], [[Least Privilege]], [[Malware]], [[Metadata]], [[Metadata Element]], [[Mode Of Operation]], [[Parameters]], [[Pre-activation State]], [[Privacy]], [[Profile]], [[Qubit]], [[Recover (key/metadata)]], [[Registration]], [[Rekey]], [[Renewal]], [[Revoked State]], [[Role]], [[Rootkit]], [[Router]], [[Scalability]], [[Scheme]], [[Sector]], [[Security Domain]], [[Security Policy]], [[Security Strength]], [[Semantics]], [[Standard]], [[Store (key/metadata)]], [[Suspended State]], [[Syntax]], [[Trust]], [[Trust Anchor]], [[Trust Anchor Store]], [[Trusted Association]], [[Trusted Channel]], [[Unlinkability]], [[Unobservability]], [[User]], [[Validate]]&lt;br /&gt;
&lt;br /&gt;
[[Category:Standards]]&lt;br /&gt;
[[Category:Security Control Implementation Guide]]&lt;/div&gt;</summary>
		<author><name>Omaerz</name></author>
	</entry>
</feed>