没有合适的资源?快使用搜索试试~ 我知道了~
首页ECC 算法P 256曲线 规范
资源详情
资源推荐
NIST Special Publication 800-56C
Recommendation for Key Derivation
through Extraction-then-Expansion
Lily Chen
Computer Security Division
Information Technology Laboratory
C O M P U T E R S E C U R I T Y
November 2011
U.S. Department of Commerce
John E. Bryson, Secretary
National Institute of Standards and Technology
Patrick D. Gallagher, Under Secretary for Standards and Technology and Director
SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion
Abstract
This Recommendation specifies techniques for the derivation of keying material from a
shared secret established during a key establishment scheme defined in NIST Special
Publications 800-56A or 800-56B through an extraction-then-expansion procedure.
KEY WORDS: key derivation, extraction, expansion
2
SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion
Acknowledgements
The author, Lily Chen of the National Institute of Standards and Technology (NIST),
would like to acknowledge the authors, Yevgeniy Dodis, Rosario Gennros, Johan Håstad,
Hugo Krawczyk, and Tal Rabin, of Crypto 2004 paper titled “Randomness extraction and
key derivation using CBC, cascade and HMAC modes [12]” for formalizing the idea of
extraction-then-expansion key derivation. Especially, the author would like to
acknowledge Hugo Krawczyk for introducing the instantiation of extraction-then-
expansion with HMAC as presented in [10] and [11].
The author like to thank her colleagues, Elaine Barker, Quynh Dang, Sharon Keller, John
Kelsey, Allen Roginsky, Meltem Sonmez Turan, and Tim Polk of NIST, Miles Smid of
Orion Security Solutions, and Rich Davis of the National Security Agency, for helpful
discussions and valuable comments.
The author gratefully appreciates the thoughtful and instructive comments received
during the public comment periods, which helped to improve the quality of this
publication.
3
SP 800-56C, Recommendation for Key Derivation through Extraction-then-Expansion
Authority
This document has been developed by the National Institute of Standards and Technology
(NIST) in furtherance of its statutory responsibilities under the Federal Information
Security Management Act (FISMA) of 2002, Public Law 107-347.
NIST is responsible for developing standards and guidelines, including minimum
requirements, for providing adequate information security for all agency operations and
assets, but such standards and guidelines shall not apply to national security systems.
This guideline is consistent with the requirements of the Office of Management and
Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as
analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental information is
provided in A-130, Appendix III.
This Recommendation has been prepared for use by federal agencies. It may be used by
nongovernmental organizations on a voluntary basis and is not subject to copyright.
(Attribution would be appreciated by NIST.)
Nothing in this Recommendation should be taken to contradict standards and guidelines
made mandatory and binding on federal agencies by the Secretary of Commerce under
statutory authority, nor should these guidelines be interpreted as altering or superseding
the existing authorities of the Secretary of Commerce, Director of the OMB, or any other
federal official.
Conformance testing for implementations of this Recommendation will be conducted
within the framework of the Cryptographic Algorithm Validation Program (CAVP) and
the Cryptographic Module Validation Program (CMVP). The requirements of this
Recommendation are indicated by the word “shall”. Some of these requirements may be
out-of-scope for CAVP and CMVP validation testing, and thus are the responsibility of
entities using, implementing, installing, or configuring applications that incorporate this
Recommendation.
4
剩余16页未读,继续阅读
haiyanya2
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- zigbee-cluster-library-specification
- JSBSim Reference Manual
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功