Key Derivation Functions and their Uses
draft-irtf-cfrg-kdf-uses-00
| Document | Type | Expired Internet-Draft (cfrg RG) | |
|---|---|---|---|
| Authors | David McGrew , Brian Weis | ||
| Last updated | 2010-02-26 | ||
| Stream | Internet Research Task Force (IRTF) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
htmlized
pdfized
bibtex
|
||
| Stream | IRTF state | (None) | |
| Consensus boilerplate | Unknown | ||
| Document shepherd | (None) | ||
| IESG | IESG state | Expired | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
This Internet-Draft is no longer active. A copy of
the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-irtf-cfrg-kdf-uses-00.txt
https://www.ietf.org/archive/id/draft-irtf-cfrg-kdf-uses-00.txt
Abstract
This note surveys the existing designs for Key Derivation Functions (KDFs), the purposes for which they are used, and their security and usability goals. Importantly, some important protocols use KDFs for multiple purposes. We offer conclusions to guide future standards work and research on KDFs.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)