U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Key-derivation procedure

Definition(s):

  A procedure consisting of multiple steps and using an approved algorithm (e.g., a MAC algorithm) by which keying material is derived from a shared secret and other information.
Source(s):
NIST SP 800-56A Rev. 2 [Superseded]

  As used in this Recommendation, a multi-step process to derive secret keying material from a shared secret and other information.
Source(s):
NIST SP 800-56B Rev. 2

  As used in this Recommendation, a two-step key-derivation method consisting of randomness extraction followed by key expansion.
Source(s):
NIST SP 800-133 Rev. 2

  A multi-step process that uses an approved Message Authentication Code (MAC) algorithm to derive keying material from a shared secret and other information.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded]