Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST Releases Updates for Cryptographic Key-Establishment Recommendations: Special Publications 800-56A and 800-56C

NIST has updated two publications on cryptographic key-establishment schemes—procedures that result in secret keying material being shared among different parties. The first publication, Special Publication (SP) 800-56A Revision 3, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, approves the use of specific safe-prime groups of domain parameters for the finite field Diffie-Hellman (DH) and Menezes-Qu-Vanstone (MQV) key establishment schemes, in addition to the previously approved domain parameter sets.

The second publication, SP 800-56C Revision 1, Recommendation for Key-Derivation Methods in Key-Establishment Schemes, specifies two categories of key-derivation methods that can be used. The first category consists of a family of one-step key-derivation functions, which derive keying material from a shared secret generated during the execution of a key-establishment scheme. The second category consists of two-step key-derivation methods that involve the following two steps: 1) randomness extraction, to obtain a single cryptographic key-derivation key from a shared secret generated during the execution of a key-establishment scheme; and 2) key expansion, to derive keying material from that key-derivation key and other information.

Released April 16, 2018, Updated February 3, 2025
Was this page helpful?