Bookmark and Share

Cryptographic Key Management Workshop 2012


NIST is conducting a two-day Key Management Workshop on September 10-11. The subject of the workshop is the technical and administrative aspects of Cryptographic Key Management Systems (CKMSs) that currently exist and may be required for U.S. Federal use in the future. The first day will review the DRAFT NIST Special Publication 800-130 (“A Framework for Designing CKMS”) and the DRAFT NIST Special Publication 800-152 (“A Profile for U.S. Federal CKMS”) and solicit comments from the workshop participants on the DRAFT documents. The second day will focus on CKMS capabilities in future security products and services in new U.S. Federal Information Systems. Input from Workshop participants will be solicited regarding the utility and feasibility of these capabilities as well as suggestions for other technical capabilities required in future CKMSs.

*NEW!* Summary of the Workshop on Cryptograhpic Key Management Systems


The event was webcast live September 10 and 11. The link to the webcast is no longer available.  


Reference Documentation: Copies of NIST SP 800-130 and NIST SP 800-152 will not be available at the workshop. If you'd like to reference either document while at the workshop, please print a copy to bring along. 

Monday, September 10, 2012

9:00am - 9:15am

Welcome and administrative information – Elaine Barker, NIST

9:15am - 10:00am Key Management in Historical PerspectiveWhitfield Diffie
10:00am - 11:15am Review NIST SP 800-130 goals, audience, anticipated benefits and potential impacts; summarize CKMS design requirements and how they can be satisfiedMiles Smid, NIST Guest Researcher
11:15am - 11:35am Break
11:35am - 12:00pm Discussion of NIST SP 800-130, participant recommendations for improving the document, CKMS and domain security policies, CKMS market forcesMiles Smid, NIST Guest Researcher
12:00pm - 12:30pm NIST SP 800-130 to Evaluate Existing SystemsTony Stieber
12:30pm - 1:30pm Lunch
1:30pm - 2:00pm Review the NIST SP 800-152 goals, its intended audience and scope, the differences between the Framework and the Profile, and their anticipated uses– Elaine Barker, NIST
2:00pm - 3:00pm Discuss the draft requirements for NIST SP 800-152 – Elaine Barker, Miles Smid, Dennis Branstad
3:00pm - 3:30pm Break
3:30pm - 5:00pm Discussion of NIST SP 800-152 requirements (continued) – Elaine Barker, Miles Smid, Dennis Branstad

Tuesday, September 11, 2012

  Moderator: Bill Newhouse, NIST
9:00am - 9:30am

Welcome and Leap-ahead Inspirational TalkTim Polk, NIST

9:30am - 10:00am Security Policies as a Foundation for Cryptographic Key ManagementDennis Branstad, NIST Guest Researcher
10:00am - 10:30am How to Balance Privacy and Key Management in User AuthenticationAnna Lysyanskaya, Brown University
10:30am - 11:00am Break
11:00am - 11:30am Key Centric Identity and Privilege ManagementPaul Lambert, Marvell
11:30am - 12:00pm Wireless/Mobile ApplicationsLily Chen, NIST
12:00pm - 12:30pm Securely Managing Cryptographic Keys used within a Cloud EnvironmentSarbari Gupta, Electrosoft
12:30pm - 1:30pm Lunch
1:30pm - 2:00pm Random Bit Generation Using SP 800-90Elaine Barker, NIST
2:00pm - 2:30pm Secure Key Storage and True Random Number Generation – An Overview - Rene Struik, Struik Security Consultancy
2:30pm - 3:00pm Designing Key Management with Usability in MindMary Theofanos, NIST
3:00pm - 3:30pm Break
3:30pm - 4:15pm Panel: Cross-Domain Interactions: Scenarios and SolutionsBob Griffin, RSA; John Leiseboer, Quintessence Labs; and Saikat Saha, SafeNet
4:15pm - 4:45pm Key Management Challenges of Derived Credentials and Techniques for Addressing ThemFrancisco Corella, Pomcor
4:45pm - 5:00pm Workshop Wrap-Up - Tim Polk, NIST

Call for Presentations

During the development of SP 800-130 (the Key Management Framework) and SP 800-152 (the Profile document), NIST identified a number of properties as particularly hard problems associated with secure Cryptographic Key Management Systems (CKMS). These problems include:

- Cryptographic
- Agility
- Scalability
- Anonymity
- Unlinkability
- Unobservability
- Usability
- Compromise recovery
- Multi-level security domains
- Negotiating and enforcing domain security policies, including a  Policy Language for enabling negotiation and enforcement
- Interaction between domains, each with its own security policies

The second day of the workshop will focus on these and other hard problems. NIST requests the submission of abstracts for presentation about these and other problems associated with key management systems. These submissions should be no longer than two paragraphs in length and should be submitted to kmwquestions@nist.gov by August 6th.


Start Date: Monday, September 10, 2012
End Date: Tuesday, September 11, 2012
Location: NIST-Gaithersburg, MD - Administration Building/Lecture Room A
Audience: Industry, Government, Academia
Format: Workshop


Registration closed September 4.

Registration Fee: $20.00. All attendees must be pre-registered to gain entry to the NIST campus.  Photo identification must be presented at the main gate to be admitted to the conference. International attendees are required to present a passport. Attendees must wear their conference badge at all times while on the campus. There is no on-site registration for meetings held at NIST.

Registration is not required to view the webcast.

Cancellation requests must be received in writing or by email by 5:00 p.m. ET September 4, 2012 to be eligible for a refund of the entire registration fee. Please send inquiries to angela.ellis@nist.gov

NIST Visitor Information

Registration Contact:

Angela Ellis

Technical Contact:

Elaine Barker
Dennis Branstad
Lily Chen
Tim Polk
Miles Smid