Key-derivation method: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (2 intermediate revisions by the same user not shown) | |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (2 intermediate revisions by the same user not shown) | |
(No difference)
| |
As used in this Recommendation, a process that derives secret keying material from a shared secret. This Recommendation specifies both one-step and two-step key-derivation methods.
Source: NIST SP 800-56C Rev. 2 | Category: