Key expansion: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (One intermediate revision by the same user not shown) | |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (One intermediate revision by the same user not shown) | |
(No difference)
| |
The second step in the key-derivation procedure specified in this Recommendation in which a key-derivation key is used to derive secret keying material having the desired length.
Source: NIST SP 800-56C Rev. 2 | Category: