gptkbp:instance_of
|
gptkb:Publications
|
gptkbp:addresses
|
cryptographic key lengths
|
gptkbp:administered_by
|
gptkb:2019
|
gptkbp:aims_to
|
enhance security of cryptographic systems
|
gptkbp:applies_to
|
federal information systems
|
gptkbp:available_at
|
NIST website
|
gptkbp:collaborated_with
|
industry stakeholders
|
gptkbp:developed_by
|
gptkb:NIST_Computer_Security_Division
|
gptkbp:focuses_on
|
gptkb:crypt
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST SP 800-131 B
|
gptkbp:is_adopted_by
|
non-profit organizations
international standards organizations
private sector organizations
|
gptkbp:is_advisory_for
|
cryptographic implementations
|
gptkbp:is_aligned_with
|
gptkb:ISO_9001
federal guidelines
|
gptkbp:is_cited_in
|
gptkb:academic_research
gptkb:NIST_SP_800-53
|
gptkbp:is_collaborative_with
|
academic institutions
government entities
|
gptkbp:is_compliant_with
|
federal regulations
|
gptkbp:is_critical_for
|
data protection
|
gptkbp:is_designed_to
|
system architects
|
gptkbp:is_discussed_in
|
security conferences
policy briefs
|
gptkbp:is_evaluated_by
|
security audits
risk assessments
|
gptkbp:is_guided_by
|
gptkb:Cybersecurity
|
gptkbp:is_influential_in
|
cybersecurity policies
|
gptkbp:is_informed_by
|
best practices
emerging technologies
|
gptkbp:is_integrated_with
|
security assessments
security policies
|
gptkbp:is_part_of
|
gptkb:National_Guard
gptkb:NIST_Risk_Management_Framework
gptkb:NIST_Special_Publication_series
federal information security framework
|
gptkbp:is_prominent_in
|
cybersecurity frameworks
information security discussions
|
gptkbp:is_promoted_by
|
NIST outreach programs
|
gptkbp:is_promoted_through
|
workshops
|
gptkbp:is_recommended_by
|
government agencies
cryptography experts
|
gptkbp:is_referenced_in
|
gptkb:FIPS_140-3
industry publications
technical standards
government reports
security training materials
|
gptkbp:is_related_to
|
gptkb:NIST_SP_800-175
|
gptkbp:is_relevant_to
|
government agencies
|
gptkbp:is_reviewed_by
|
peer reviewers
|
gptkbp:is_supported_by
|
gptkb:Documentation
training programs
government funding
research initiatives
|
gptkbp:is_updated_by
|
NIST SP 800-131 C
|
gptkbp:is_used_by
|
security professionals
|
gptkbp:is_used_for
|
security assessments
|
gptkbp:is_utilized_by
|
IT departments
|
gptkbp:is_utilized_for
|
compliance checks
|
gptkbp:is_utilized_in
|
security frameworks
|
gptkbp:provides_guidance_on
|
encryption methods
transitioning to stronger cryptographic algorithms
|
gptkbp:published_by
|
gptkb:PDF_format
gptkb:NIST
|
gptkbp:recommendation
|
key management practices
|
gptkbp:replaces
|
gptkb:NIST_SP_800-131_A
|
gptkbp:supports
|
risk management framework
|
gptkbp:bfsParent
|
gptkb:NIST_SP_800-131_A
|
gptkbp:bfsLayer
|
6
|