Key-derivation method: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
(No difference)
| |||
As used in this Recommendation, a process that derives secret keying material from a shared secret. This Recommendation specifies both one-step and two-step key-derivation methods.
Source: NIST SP 800-56C Rev. 2 | Category: