This article does not cite any sources. (February 2018) (Learn how and when to remove this template message)
A cryptographic key is called ephemeral if it is generated for each execution of a key establishment process. In some cases ephemeral keys are used more than once, within a single session (e.g., in broadcast applications) where the sender generates only one ephemeral key pair per message and the private key is combined separately with each recipient's public key. Contrast with a static key.
Private / public ephemeral key agreement key
Private (resp. public) ephemeral key agreement keys are the private (resp. public) keys of asymmetric key pairs that are used a single key establishment transaction to establish one or more keys (e.g., key wrapping keys, data encryption keys, or MAC keys) and, optionally, other keying material (e.g., initialization vectors).
- Recommendation for Key Management — Part 1: General, NIST Special Publication 800-57
- NIST Cryptographic Toolkit
|This cryptography-related article is a stub. You can help Wikipedia by expanding it.|