RFC 5869 Extract - and - Expand HKDF

نویسندگان

  • H. Krawczyk
  • P. Eronen
چکیده

This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)

The United States of America has adopted a suite of Secure Hash Algorithms (SHAs), including four beyond SHA-1, as part of a Federal Information Processing Standard (FIPS), namely SHA-224, SHA-256, SHA-384, and SHA-512. This document makes open source code performing these SHA hash functions conveniently available to the Internet community. The sample code supports input strings of arbitrary bi...

متن کامل

Cryptographic Extraction and Key Derivation: The HKDF Scheme

In spite of the central role of key derivation functions (KDF) in applied cryptography, there has been little formal work addressing the design and analysis of general multi-purpose KDFs. In practice, most KDFs (including those widely standardized) follow ad-hoc approaches that treat cryptographic hash functions as perfectly random functions. In this paper we close some gaps between theory and ...

متن کامل

The Hermite Polynomials and the Bessel Functions from a General Point of View

where φn(x,y) are the two-variable polynomials which will be shown to be a suitable generalization of the Hermite-Kampé de Fériet (HKdF) family [1] or a particular case of the Boas-Buck polynomials [2]. As it is well known, the HKdF polynomials are generated by (1.1) when f(x) reduces to an exponential function, while in the case of Boas-Buck polynomials, the argument of f should be replaced by...

متن کامل

RIP Version 2 Carrying Additional Information

This document specifies an extension of the Routing Information Protocol (RIP), as defined in [1,2], to expand the amount of useful information carried in RIP messages and to add a measure of security. This memo obsoletes RFC 1388, which specifies an update to the "Routing Information Protocol" STD 34, RFC 1058. The RIP-2 protocol analysis is documented in RFC 1721 [4]. The RIP-2 applicability ...

متن کامل

intestinalis GiardiaMaterial in the Binucleate Intestinal Parasite

www.sciencemag.org (this information is current as of March 23, 2008 ): The following resources related to this article are available online at http://www.sciencemag.org/cgi/content/full/319/5869/1530 version of this article at: including high-resolution figures, can be found in the online Updated information and services, http://www.sciencemag.org/cgi/content/full/319/5869/1530/DC1 can be foun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010