Overview#
Key is a granted Privilege used by a lock (Policy Enforcement Point PEP) to provide Access to a Protected ResourceKey is used for locking or unlocking a Protected Resource
Key may be a physical Entity or a Digital Key or some combination of both.
Key may be an Cryptographic Key
NIST.SP.800-107#
Key is a parameter used with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot.Examples applicable to this Recommendation include:
- The computation of a keyed-hash message authentication code.
- The verification of a keyed-hash message authentication code.
- The generation of a Digital Signature on a message.
- The verification of a Digital Signature.
More Information#
There might be more information for this subject on one of the following:- AWS CloudHSM
- AWS Role
- Asymmetric cipher
- Authentication
- Block Cipher Mode
- CCM
- CTAP2
- Cipher
- Cipher-based Message Authentication Code
- Constrained Nodes
- Cryptanalysis
- Cryptographic Key
- Cryptographic Primitive
- DNC Decryption Flow
- Data Encapsulation Method
- Digital Key
- DirXML-NamedPasswords
- Encryption
- Hash Function
- Hybrid cryptosystem
- Hyperledger Indy
- Identifier
- Identity Custodian
- Kerberos Cryptosystem Negotiation Extension
- Kerberos Error Codes
- Kerberos Pre-Authentication
- Kerckhoffs principle
- Key
- Key Encapsulation Method
- Key Life cycle
- Key Management
- Key Management Service
- Key Rotation
- Key agreement
- Key pair
- Key size
- Key-Exchange
- Key-value
- KeyAgreement
- KeyEncipherment
- Keystore
- Lock
- Meet-in-the-Middle Attack
- Memorized secrets
- Metadata
- NICI
- NICISDI Keys
- NICISDITreeKeyProviderFaultTolerance
- NICITreeKeyProvider
- OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
- Password Validator
- Password-authenticated Key Exchange
- Proof-of-Possession
- Roots of Trust
- Secret-key
- Security Domain Infrastructure
- Self-Sovereign Identity
- Server Storage Key
- Session Key
- Signatures with efficient protocols
- Signing key
- Symmetric Key Cryptography
- Symmetric cipher
- The Onion Router
- Token Binding Protocol
- Transport Layer Security
- TreeKey
- Trust No One
- Trusted Platform Module
- Tweakable Block Cipher
- USER_USE_AES_KEYS
- Universal Password
- Unkeyed Primitives
- User-Account-Control Attribute Values
- WX Entries
- Web Blog_blogentry_161018_1
- Web Blog_blogentry_250719_1
- WebAuthn Attestation
- Wi-Fi Protected Access 2