Jump to content

Ephemeral key: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Fixed dead link
Updated broken link.
Line 5: Line 5:


==External links==
==External links==
* ''Recommendation for Key Management — Part 1: general,'' [http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf NIST Special Publication 800-57]
* ''Recommendation for Key Management — Part 1: general,'' [http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf NIST Special Publication 800-57]
* [http://csrc.nist.gov/groups/ST/toolkit/ NIST ''Cryptographic Toolkit'']
* [http://csrc.nist.gov/groups/ST/toolkit/ NIST ''Cryptographic Toolkit'']



Revision as of 13:03, 19 March 2015

A cryptographic key is called ephemeral if it is generated for each execution of a key establishment process. In some cases ephemeral keys are used more than once, within a single session (e.g., in broadcast applications) where the sender generates only one ephemeral key pair per message and the private key is combined separately with each recipient's public key. Contrast with a static key.

See also