%% You should probably cite draft-ietf-hokey-emsk-hierarchy instead of this I-D. @techreport{salowey-eap-emsk-deriv-01, number = {draft-salowey-eap-emsk-deriv-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-salowey-eap-emsk-deriv/01/}, author = {Joseph A. Salowey}, title = {{Specification for the Derivation of Usage Specific Root Keys (USRK) from an Extended Master Session Key (EMSK)}}, pagetotal = 16, year = 2006, month = jun, day = 27, abstract = {An Extended Master Session Key (EMSK) is a cryptographic key generated from an Extensible Authentication Protocol (EAP) exchange reserved solely for the purpose of deriving master keys for one or more purposes identified as usage definitions. This document specifies a mechanism for deriving cryptographically separate root keys from the EMSK, called usage specific root Keys (USRK). The document provides a set of requirements for avoiding conflicts between usage definitions to ensure this cryptographic separation. The USRK is used according to the usage definition defined for a specific purpose.}, }