gptkbp:instance_of
|
gptkb:publishing_company
|
gptkbp:bfsLayer
|
3
|
gptkbp:bfsParent
|
gptkb:Federal_Information_Processing_Standards_Publication_186
|
gptkbp:addresses
|
symmetric and asymmetric key establishment
|
gptkbp:aims_to
|
enhance security
|
gptkbp:applies_to
|
information technology systems
|
gptkbp:contains
|
recommendations for key management
|
gptkbp:developed_by
|
gptkb:NIST_Cryptographic_Technology_Group
enhancing cryptographic practices
|
gptkbp:first_published
|
gptkb:2007
|
gptkbp:focuses_on
|
key establishment schemes
|
https://www.w3.org/2000/01/rdf-schema#label
|
NIST Special Publication 800-56 A
|
gptkbp:is_adopted_by
|
international standards organizations
private sector organizations
|
gptkbp:is_available_on
|
NIST website
|
gptkbp:is_cited_in
|
NISTSP 800-53
NISTSP 800-53 A
NISTSP 800-131 A
NISTSP 800-175
NISTSP 800-175 B
|
gptkbp:is_designed_to
|
government and industry stakeholders
|
gptkbp:is_documented_in
|
NIST Digital Library of Publications
|
gptkbp:is_influential_in
|
cryptographic standards development
|
gptkbp:is_part_of
|
gptkb:Company
gptkb:NIST_Risk_Management_Framework
gptkb:NIST_Special_Publication_series
gptkb:NIST_Special_Publication_800_series
NIST Cybersecurity Framework publications
|
gptkbp:is_referenced_in
|
gptkb:FIPS_140-3
gptkb:ISO/_IEC_18033-2
NISTSP 800-152
NISTSP 800-56 D
|
gptkbp:is_related_to
|
NISTSP 800-56 C
NISTSP 800-57
NISTSP 800-90 A
|
gptkbp:is_reviewed_by
|
gptkb:NIST_Technical_Review_Board
|
gptkbp:is_supported_by
|
gptkb:NIST_Cybersecurity_Division
|
gptkbp:is_used_by
|
federal agencies
|
gptkbp:is_used_for
|
secure key distribution
|
gptkbp:is_used_in
|
secure data transmission
|
gptkbp:is_utilized_in
|
security professionals
federal information systems
|
gptkbp:provides
|
guidelines for key establishment
|
gptkbp:provides_information_on
|
key agreement protocols
|
gptkbp:published_by
|
gptkb:NIST
|
gptkbp:related_to
|
gptkb:currency
|
gptkbp:supports
|
secure communications
|
gptkbp:updates
|
gptkb:2018
gptkb:NIST_Special_Publication_800-56_B
|