Cryptographic Extraction and Key Derivation: The HKDF Scheme

被引:0
|
作者
Krawczyk, Hugo [1 ]
机构
[1] IBM TJ Watson Res Ctr, Hawthorne, NY USA
来源
关键词
DIFFIE-HELLMAN; RANDOMNESS; SECURITY; GENERATOR; CASCADE; BOUNDS; HMAC;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In spite of the central role of key derivation functions (KDF) in applied cryptography, there has been little formal work addressing the design and analysis of general multi-purpose KDFs. In practice, most KDFs. (including those widely standardized) follow ad-hoc approaches that treat cryptographic hash functions as perfectly random functions. In this paper we close some gaps between theory and practice by contributing to the study and engineering of KDFs in several ways. We provide detailed rationale for the design of KDFs based on the extract-then-expand approach; we present the first general and rigorous definition of KDFs and their security that we base on the notion of computational extractors; we specify a concrete fully practical KDF based on the HMAC construction; and we provide an analysis of this construction based on the extraction and pseudorandom properties of HMAC. The resultant KDF design can support a large variety of KDF applications under suitable assumptions on the underlying hash function; particular attention and effort is devoted to minimizing these assumptions as much as possible for each usage scenario. Beyond the theoretical interest in modeling KDFs, this work is intended to address two important and timely needs of cryptographic applications: (i) providing a single hash-based KDF design that can be standardized for use in multiple and diverse applications, and (ii) providing a conservative, yet efficient, design that exercises much care in the way it; utilizes a cryptographic hash function. (The HMAC-based scheme presented here, named HKDF, is being standardized by the IETF.)
引用
收藏
页码:631 / 648
页数:18
相关论文
共 50 条
  • [1] On optimal cryptographic key derivation
    Chan, Aldar C. -F.
    THEORETICAL COMPUTER SCIENCE, 2013, 489 : 21 - 36
  • [2] A Multivariate Public Key Cryptographic Scheme
    Yuan Feng
    Sun Ying
    Jiang Jijun
    Zhao Shangwei
    Xu Shengwei
    CHINA COMMUNICATIONS, 2014, 11 (12) : 120 - 124
  • [3] A New Public Key Cryptographic Scheme
    Yuan, Feng
    Ou, Haiwen
    Xu, Shengwei
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 1944 - 1947
  • [4] Comments on a cryptographic key assignment scheme
    Tang, Q
    Mitchell, CJ
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (03) : 323 - 326
  • [5] A Lightweight Cryptographic Scheme with Dynamic Key
    Wu, Yuxin
    Wang, Jing
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2018, : 232 - 236
  • [6] Cryptographic Key Extraction from Music
    Kumar, Chandan
    Dutta, Sandip
    Chakraborty, Soubhik
    ADVANCES IN COMPUTATIONAL INTELLIGENCE, 2017, 509 : 309 - 317
  • [7] Random key encryption a new cryptographic scheme
    Shafeeq, Muhammad
    Durrani, Mehr Yahya
    Afzal, Ifraseab
    ICIET 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND EMERGING TECHNOLOGIES, 2007, : 59 - +
  • [8] Secured Key Distribution Scheme for Cryptographic Key Management System
    Khaing, Kyawt Kyawt
    Aung, Khin Mi Mi
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 481 - 486
  • [9] Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
    Wen, JH
    Sheu, JS
    Chen, TS
    IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (04): : 260 - 264
  • [10] Dynamic Key Extraction Technique Using Pulse Signal and Lightweight Cryptographic Authentication Scheme for WBAN
    Ahmad, Shafiq
    Rehman, Zia Ur
    Altaf, Saud
    Zaindin, Mazen
    Huda, Shamsul
    Haroon, Muhammad
    Iqbal, Sofia
    SUSTAINABILITY, 2022, 14 (21)