Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 800-56C Rev. 1 (DRAFT)

Recommendation for Key Derivation through Extraction-then-Expansion

Date Published: August 2017
Comments Due: November 6, 2017 (public comment period is CLOSED)
Email Questions to: 800-56C_Comments@nist.gov

Author(s)

Elaine Barker (NIST), Lily Chen (NIST), Richard Davis (NSA)

Announcement

NIST announces the public comment release of SP 800-56C Rev. 1 and SP 800-56A Rev. 3. SP 800-56C has been revised to include all key derivation methods currently included in SP 800-56A and SP 800-56B, Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography, in addition to the two-step key-derivation procedure currently specified in SP 800-56C. Note the change of title for SP 800-56C that reflects the inclusion of the additional key-derivation methods. SP 800-56C Revision 1 also includes the use of KMAC128 and KMAC256 as key-derivation primitives for the one-step key-derivation method.

Abstract

Keywords

expansion; extraction; extraction-then-expansion; hash  key  key establishment; function; message authentication code ; derivation
Control Families

System and Communications Protection;

Documentation

Publication:
Draft SP 800-56C Rev. 1

Supplemental Material:
Comment Template (word)

Other Parts of this Publication:
SP 800-56A Rev. 3 (DRAFT)
SP 800-56B Rev. 1

Topics

Security and Privacy
key management