Key Derivation Functions and their Uses
draft-irtf-cfrg-kdf-uses-00
This document is an Internet-Draft (I-D) that has been submitted to the Internet Research Task Force (IRTF) stream.
This I-D is not endorsed by the IETF and has no formal standing in the
IETF standards process.
Document | Type |
Expired Internet-Draft
(cfrg RG)
Expired & archived
|
|
---|---|---|---|
Authors | David McGrew , Brian Weis | ||
Last updated | 2010-02-26 | ||
RFC stream | Internet Research Task Force (IRTF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | IRTF state | (None) | |
Consensus boilerplate | Unknown | ||
Document shepherd | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This note surveys the existing designs for Key Derivation Functions (KDFs), the purposes for which they are used, and their security and usability goals. Importantly, some important protocols use KDFs for multiple purposes. We offer conclusions to guide future standards work and research on KDFs.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)