Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Quynh H. Dang;|
|Title:||Recommendation for Existing Application-Specific Key Derivation Functions|
|Published:||December 23, 2011|
|Abstract:||Cryptographic keys are vital to the security of internet security applications and protocols. Many widely-used internet security protocols have their own application-specific Key Derivation Functions (KDFs) that are used to generate the cryptographic keys required for their cryptographic functions. This Recommendation provides security requirements for those KDFs. [Supersedes SP 800-135 (December 2010): http://www.nist.gov/manuscript-publication-search.cfm?pub_id=907520]|
|Citation:||Special Publication (NIST SP) - 800-135 Rev 1|
|Keywords:||Cryptographic key, shared secret, Diffie-Hellman (DH) key exchange, hash function, Key Derivation Function (KDF), Hash-based Key Derivation Function, Randomness Extraction, Key expansion, Pseudorandom Function (PRF), HMAC, ANS X9.42-2001, ANS X9.63-2001, IKE, SSH, TLS, SRTP, SNMP, TPM|
|Research Areas:||Computer Security|