U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

SP 800-56C Rev. 1 (Draft)

Recommendation for Key Derivation through Extraction-then-Expansion

Date Published: August 2017
Comments Due: November 6, 2017 (public comment period is CLOSED)
Email Questions to: 800-56C_Comments@nist.gov

Author(s)

Elaine Barker (NIST), Lily Chen (NIST), Richard Davis (NSA)

Announcement

NIST announces the public comment release of SP 800-56C Rev. 1 and SP 800-56A Rev. 3. SP 800-56C has been revised to include all key derivation methods currently included in SP 800-56A and SP 800-56B, Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography, in addition to the two-step key-derivation procedure currently specified in SP 800-56C. Note the change of title for SP 800-56C that reflects the inclusion of the additional key-derivation methods. SP 800-56C Revision 1 also includes the use of KMAC128 and KMAC256 as key-derivation primitives for the one-step key-derivation method.

Abstract

Keywords

extraction-then-expansion; hash ; key ; key establishment; function; message authentication code; derivation; extraction; expansion
Control Families

System and Communications Protection

Documentation

Publication:
Draft SP 800-56C Rev. 1

Supplemental Material:
Comments received (pdf)

Other Parts of this Publication:
SP 800-56A Rev. 3 (Draft)
SP 800-56B Rev. 1

Document History:
08/07/17: SP 800-56C Rev. 1 (Draft)

Topics

Security and Privacy
key management