Recommendation for Existing Application-Specific Key Derivation Functions

Cryptographic keys are vital to the security of internet security applications and protocols. Many widely-used internet security protocols have their own application-specific Key Derivation Functions (KDFs) that are used to generate the cryptographic keys required for their cryptographic functions. This Recommendation provides security requirements for those KDFs.

[1]  Sean Turner,et al.  Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) , 2010, RFC.

[2]  Lidong Chen,et al.  Recommendation for Key Derivation Using Pseudorandom Functions (Revised) , 2009 .

[3]  Lidong Chen,et al.  Recommendation for Key Derivation through Extraction-then-Expansion , 2011 .

[4]  Simon Blake-Wilson,et al.  Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) , 2002, RFC.

[5]  Morris J. Dworkin,et al.  SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .

[6]  Mats Näslund,et al.  The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.

[7]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[8]  Tatu Ylönen,et al.  The Secure Shell (SSH) Connection Protocol , 2006, RFC.

[9]  Elaine B. Barker,et al.  SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .

[10]  David A. McGrew The Use of AES-192 and AES-256 in Secure RTP , 2011, RFC.

[11]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[12]  Uri Blumenthal,et al.  User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) , 1998, RFC.

[13]  Dan Harkins,et al.  The Internet Key Exchange (IKE) , 1998, RFC.

[14]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[15]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[16]  Bert Wijnen,et al.  An Architecture for Describing SNMP Management Frameworks , 1998, RFC.

[17]  Elaine B. Barker,et al.  SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .

[18]  Baugher,et al.  The Secure Real-Time Transport Protocol , 2003 .

[19]  Bill Hancock,et al.  Elliptical curve cryptography and standards for efficient cryptography group , 1999, Computers & security.

[20]  Russ Housley,et al.  Cryptographic Message Syntax (CMS) , 2002, RFC.

[21]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[22]  Elaine B. Barker,et al.  SP 800-56B. Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography , 2009 .

[23]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[24]  Uri Blumenthal,et al.  User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) , 1999, RFC.

[25]  Hugo Krawczyk,et al.  On Extract-then-Expand Key Derivation Functions and an HMAC-based KDF ∗ , 2008 .

[26]  H. Schulzrinne,et al.  A Transport Protocol for Real-time Applications , 2010 .

[27]  Tatu Ylönen,et al.  The Secure Shell (SSH) Authentication Protocol , 2006, RFC.

[28]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[29]  Tatu Ylönen,et al.  The Secure Shell (ssh) Transport Layer Protocol , 2006 .

[30]  Eric Rescorla,et al.  Diffie-Hellman Key Agreement Method , 1999, RFC.

[31]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .