Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Quynh H. Dang;|
|Title:||Recommendation for Existing Application-Specific Key Derivation Functions|
|Published:||December 23, 2010|
|Abstract:||[Superseded by NIST SP 800-135 Rev. 1, "Recommendation for Existing Application-Specific Key Derivation Functions" (December 2011), http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910283] Cryptographic keys are vital to the security of internet security applications and protocols. Many widely-used internet security protocols have their own application-specific Key Derivation Functions (KDFs) that are used to generate the cryptographic keys required for their cryptographic functions. This Recommendation provides security requirements for those KDFs.|
|Citation:||Special Publication (NIST SP) - 800-135|
|Keywords:||Cryptographic key, shared secret, Diffie-Hellman (DH) key exchange, hash function, Key Derivation Function (KDF), Hash-based Key Derivation Function, Randomness Extraction, Key Expansion, Pseudorandom Function (PRF), HMAC, ANS X9.42-2001, ANS X9.63-2001, IKE, SSH, TLS, SRTP, SNMP, TPM|
|Research Areas:||Computer Security|