U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

NIST Updates Cryptographic Key-Establishment Recommendations: Special Publications 800-56A and 800-56C
April 16, 2018

Secret cryptographic keying material may be electronically established between parties by using a key-establishment schemeā€”a procedure that results in secret keying material being shared among different parties. A newly released NIST publication, Special Publication (SP) 800-56A Revision 3, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, specifies key-establishment schemes based on the discrete logarithm problem over finite fields and elliptic curves, including several variations of Diffie-Hellman (DH) and Menezes-Qu-Vanstone (MQV) key-establishment schemes. The publication approves the use of specific safe-prime groups of domain parameters for the finite field DH and MQV schemes, in addition to the previously approved domain parameter sets. For the elliptic curve DH and MQV schemes, the publication provides an approved list of the domain parameters.

NIST is also releasing Special Publication 800-56C Revision 1Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in SP 800-56A or SP 800-56BRecommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography (please note that SP 800-56B is undergoing revision to accommodate this reorganization).

SP 800-56C Rev. 1 specifies two categories of key-derivation methods that derive keying material from a shared secret generated during the execution of a key-establishment scheme. The first category consists of hash-based key-derivation functions, including the recently approved KMAC128 and KMAC256 functions. The second category consists of two-step key-derivation methods that involve the following two steps: 1) randomness extraction, to obtain a single cryptographic key-derivation key, and 2) key expansion, to derive keying material from that key-derivation key and other information.

All methods specified in the previous version of SP 800-56A (Rev. 2) for key derivation of secret keying material from a shared secret computed during a key-agreement scheme have been moved to SP 800-56C Rev. 1.

Related Topics

Security and Privacy: key management

Created April 16, 2018, Updated June 22, 2020