U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

Secure websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to our website. Please do not share sensitive information with us.

This is an archive
(replace .gov by .rip)

SP 800-56C Rev. 2

Recommendation for Key-Derivation Methods in Key-Establishment Schemes

Date Published: August 2020

Supersedes: SP 800-56C Rev. 1 (04/16/2018)

Author(s)

Elaine Barker (NIST), Lily Chen (NIST), Richard Davis (NSA)

Abstract

Keywords

expansion; extraction; extraction-then-expansion; hash function; key derivation; key establishment; message authentication code
Control Families

System and Communications Protection

Documentation

Publication:
SP 800-56C Rev. 2 (DOI)
Local Download

Supplemental Material:
Comments received on Draft SP 800-56C Rev. 2 (pdf)

Other Parts of this Publication:
SP 800-56A Rev. 3
SP 800-56B Rev. 2

Document History:
03/24/20: SP 800-56C Rev. 2 (Draft)
08/18/20: SP 800-56C Rev. 2 (Final)

Topics

Security and Privacy
key management