Ephemeral key: Difference between revisions
Appearance
Content deleted Content added
Updated broken link. |
|||
Line 5: | Line 5: | ||
==External links== |
==External links== |
||
* ''Recommendation for Key Management — Part 1: |
* ''Recommendation for Key Management — Part 1: General,'' [http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf NIST Special Publication 800-57] |
||
* [http://csrc.nist.gov/groups/ST/toolkit/ NIST ''Cryptographic Toolkit''] |
* [http://csrc.nist.gov/groups/ST/toolkit/ NIST ''Cryptographic Toolkit''] |
||
Revision as of 13:04, 19 March 2015
A cryptographic key is called ephemeral if it is generated for each execution of a key establishment process. In some cases ephemeral keys are used more than once, within a single session (e.g., in broadcast applications) where the sender generates only one ephemeral key pair per message and the private key is combined separately with each recipient's public key. Contrast with a static key.
See also
External links
- Recommendation for Key Management — Part 1: General, NIST Special Publication 800-57
- NIST Cryptographic Toolkit