Skip to main content

Secure Session Key Generation. Creating PRF from MAC Function
draft-blumenthal-keygen-03

Document Type Expired Internet-Draft (individual in sec area)
Expired & archived
Author Uri Blumenthal
Last updated 2015-10-14 (Latest revision 2002-07-08)
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status Best Current Practice
Formats
Stream WG state (None)
Document shepherd (None)
IESG IESG state Expired (IESG: Dead)
Action Holders
(None)
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD Steven M. Bellovin
IESG note
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document describes Pseudo Random Function (PRF) based on MAC function (keyed iterated hash function), and offers a ref- erence implementation of PRF based on SHA-1. This PRF can be used to produce cryptographic keys for authen- tication/integrity and encryption. It uses pre-shared secret and publicly known random value (and possibly parties’ identi- ties). The main advantage of this algorithm over other similar ones is that its security is formally tied to the MAC property of the underlying function.

Authors

Uri Blumenthal

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)