RFC 5869 Extract - and - Expand HKDF
نویسندگان
چکیده
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
منابع مشابه
US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)
The United States of America has adopted a suite of Secure Hash Algorithms (SHAs), including four beyond SHA-1, as part of a Federal Information Processing Standard (FIPS), namely SHA-224, SHA-256, SHA-384, and SHA-512. This document makes open source code performing these SHA hash functions conveniently available to the Internet community. The sample code supports input strings of arbitrary bi...
متن کاملCryptographic Extraction and Key Derivation: The HKDF Scheme
In spite of the central role of key derivation functions (KDF) in applied cryptography, there has been little formal work addressing the design and analysis of general multi-purpose KDFs. In practice, most KDFs (including those widely standardized) follow ad-hoc approaches that treat cryptographic hash functions as perfectly random functions. In this paper we close some gaps between theory and ...
متن کاملThe Hermite Polynomials and the Bessel Functions from a General Point of View
where φn(x,y) are the two-variable polynomials which will be shown to be a suitable generalization of the Hermite-Kampé de Fériet (HKdF) family [1] or a particular case of the Boas-Buck polynomials [2]. As it is well known, the HKdF polynomials are generated by (1.1) when f(x) reduces to an exponential function, while in the case of Boas-Buck polynomials, the argument of f should be replaced by...
متن کاملRIP Version 2 Carrying Additional Information
This document specifies an extension of the Routing Information Protocol (RIP), as defined in [1,2], to expand the amount of useful information carried in RIP messages and to add a measure of security. This memo obsoletes RFC 1388, which specifies an update to the "Routing Information Protocol" STD 34, RFC 1058. The RIP-2 protocol analysis is documented in RFC 1721 [4]. The RIP-2 applicability ...
متن کاملintestinalis GiardiaMaterial in the Binucleate Intestinal Parasite
www.sciencemag.org (this information is current as of March 23, 2008 ): The following resources related to this article are available online at http://www.sciencemag.org/cgi/content/full/319/5869/1530 version of this article at: including high-resolution figures, can be found in the online Updated information and services, http://www.sciencemag.org/cgi/content/full/319/5869/1530/DC1 can be foun...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010