Secure Session Key Generation. Creating PRF from MAC Function
draft-blumenthal-keygen-03
Document | Type |
Expired Internet-Draft
(individual in sec area)
Expired & archived
|
|
---|---|---|---|
Author | Uri Blumenthal | ||
Last updated | 2015-10-14 (Latest revision 2002-07-08) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | Best Current Practice | ||
Formats | |||
Stream | WG state | (None) | |
Document shepherd | (None) | ||
IESG | IESG state | Expired (IESG: Dead) | |
Action Holders |
(None)
|
||
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | Steven M. Bellovin | ||
IESG note | |||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes Pseudo Random Function (PRF) based on MAC function (keyed iterated hash function), and offers a ref- erence implementation of PRF based on SHA-1. This PRF can be used to produce cryptographic keys for authen- tication/integrity and encryption. It uses pre-shared secret and publicly known random value (and possibly parties’ identi- ties). The main advantage of this algorithm over other similar ones is that its security is formally tied to the MAC property of the underlying function.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)