A procedure consisting of multiple steps and using an approved algorithm (e.g., a MAC algorithm) by which keying material is derived from a shared secret and other information.
Source(s):
NIST SP 800-56A Rev. 2
[Superseded]
As used in this Recommendation, a multi-step process to derive secret keying material from a shared secret and other information.
Source(s):
NIST SP 800-56B Rev. 2
As used in this Recommendation, a two-step key-derivation method consisting of randomness extraction followed by key expansion.
Source(s):
NIST SP 800-133 Rev. 2
A multi-step process that uses an approved Message Authentication Code (MAC) algorithm to derive keying material from a shared secret and other information.
Source(s):
NIST SP 800-56B Rev. 1
[Superseded]