U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)

SP 800-56C Rev. 1 (Draft)

Recommendation for Key Derivation through Extraction-then-Expansion

Date Published: August 2017
Comments Due: November 6, 2017 (public comment period is CLOSED)
Email Questions to: 800-56C_Comments@nist.gov

Author(s)

Elaine Barker (NIST), Lily Chen (NIST), Richard Davis (NSA)

Announcement

NIST announces the public comment release of SP 800-56C Rev. 1 and SP 800-56A Rev. 3. SP 800-56C has been revised to include all key derivation methods currently included in SP 800-56A and SP 800-56B, Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography, in addition to the two-step key-derivation procedure currently specified in SP 800-56C. Note the change of title for SP 800-56C that reflects the inclusion of the additional key-derivation methods. SP 800-56C Revision 1 also includes the use of KMAC128 and KMAC256 as key-derivation primitives for the one-step key-derivation method.

Abstract

Keywords

extraction-then-expansion; hash ; key ; key establishment; function; message authentication code; derivation; extraction; expansion
Control Families

System and Communications Protection

Documentation

Publication:
Draft SP 800-56C Rev. 1
Comments received

Supplemental Material:
Comments received (pdf)

Other Parts of this Publication:
SP 800-56A Rev. 3 (Draft)
SP 800-56B Rev. 1

Document History:
08/07/17: SP 800-56C Rev. 1 (Draft)

Topics

Security and Privacy
key management