Cryptographic keys are vital to the security of internet security applications and protocols. Many widely-used internet security protocols have their own application-specific Key Derivation Functions (KDFs) that are used to generate the cryptographic keys required for their cryptographic functions. This Recommendation provides security requirements for those KDFs.
Cryptographic keys are vital to the security of internet security applications and protocols. Many widely-used internet security protocols have their own application-specific Key Derivation Functions (KDFs) that are used to generate the cryptographic keys required for their cryptographic functions....
See full abstract
Cryptographic keys are vital to the security of internet security applications and protocols. Many widely-used internet security protocols have their own application-specific Key Derivation Functions (KDFs) that are used to generate the cryptographic keys required for their cryptographic functions. This Recommendation provides security requirements for those KDFs.
Hide full abstract
Keywords
Cryptographic key; shared secret; Diffie-Hellman (DH) key exchange; hash function; Key Derivation Function (KDF); Hash-based Key Derivation Function; Randomness Extraction; Key Expansion; Pseudorandom Function (PRF); HMAC; ANS X9.42-2001; ANS X9.63-2001; IKE; SSH; TLS; SRTP; SNMP; TPM