Date Published: March 2020
Comments Due:
Email Questions to:
Author(s)
Elaine Barker (NIST), Lily Chen (NIST), Richard Davis (NSA)
Announcement
NIST requests comments on Special Publication (SP) 800-56C Revision 2, Recommendation for Key-Derivation Methods in Key-Establishment Schemes, which describes two categories of key-derivation methods that can be used during a key-establishment scheme as defined in SP 800-56A or SP 800-56B. The keying material derived using these methods shall be computed in its entirety before outputting any portion of it and shall only be used as secret keying material. This revision permits the use of “hybrid” shared secrets, and a newly added section specifies the conditions under which multiple instances of key expansion can be performed using a single key-derivation key obtained via randomness extraction.
NOTE: A call for patent claims is included on page iv of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in NIST Special Publications 800-56A or 800-56B.
This Recommendation specifies techniques for the derivation of keying material from a shared secret established during a key-establishment scheme defined in NIST Special Publications 800-56A or 800-56B.
Keywords
expansion; extraction; extraction-then-expansion; hash function; key derivation; key establishment; message authentication code
Control Families
System and Communications Protection;