< draft-agl-ckdf-00.txt   draft-agl-ckdf-01.txt >
Network Working Group A. Langley Network Working Group A. Langley
Internet-Draft Google Inc Internet-Draft Google Inc
Intended status: Informational August 21, 2015 Intended status: Informational August 24, 2015
Expires: February 22, 2016 Expires: February 25, 2016
CMAC-based Extract-and-Expand Key Derivation Function (CKDF) CMAC-based Extract-and-Expand Key Derivation Function (CKDF)
draft-agl-ckdf-00 draft-agl-ckdf-01
Abstract Abstract
This memo describes a KDF based on AES-CMAC. This memo describes a KDF based on AES-CMAC.
Status of This Memo Status of This Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on February 22, 2016. This Internet-Draft will expire on February 25, 2016.
Copyright Notice Copyright Notice
Copyright (c) 2015 IETF Trust and the persons identified as the Copyright (c) 2015 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
skipping to change at page 2, line 16 skipping to change at page 2, line 16
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. CKDF . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. CKDF . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
3. Test Vectors . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Test Vectors . . . . . . . . . . . . . . . . . . . . . . . . 3
3.1. CKDF-Extract . . . . . . . . . . . . . . . . . . . . . . 3 3.1. CKDF-Extract . . . . . . . . . . . . . . . . . . . . . . 3
3.2. CKDF-Expand . . . . . . . . . . . . . . . . . . . . . . . 3 3.2. CKDF-Expand . . . . . . . . . . . . . . . . . . . . . . . 3
4. Security Considerations . . . . . . . . . . . . . . . . . . . 4 4. Security Considerations . . . . . . . . . . . . . . . . . . . 4
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 4 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 4
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 4 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
6.1. Normative References . . . . . . . . . . . . . . . . . . 4 6.1. Normative References . . . . . . . . . . . . . . . . . . 4
6.2. Informative References . . . . . . . . . . . . . . . . . 4 6.2. Informative References . . . . . . . . . . . . . . . . . 5
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 5 Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction 1. Introduction
The HKDF key derivation function, described in [RFC5869], is The HKDF key derivation function, described in [RFC5869], is
currently the de-facto KDF for use in a variety of protocols. currently the de-facto KDF for use in a variety of protocols.
However, in hardware orientated designs, significant space savings However, in hardware orientated designs, significant space savings
can be achieved if the underlying primitive is AES rather than a can be achieved if the underlying primitive is AES rather than a
cryptographic hash function. cryptographic hash function.
skipping to change at page 4, line 5 skipping to change at page 4, line 5
PRK: 070a16b4 6b4d4144 f79bdd9d d04a287c PRK: 070a16b4 6b4d4144 f79bdd9d d04a287c
Salt: (none) Salt: (none)
IKM: 73656372 6574206b 6579 IKM: 73656372 6574206b 6579
PRK: 6f79b401 ea761a01 00b7ca60 c178b69d PRK: 6f79b401 ea761a01 00b7ca60 c178b69d
3.2. CKDF-Expand 3.2. CKDF-Expand
This section contains test vectors for the "CKDF-Expand" function. This section contains test vectors for the "CKDF-Expand" function.
PRK: 6f79b401 ea761a01 00b7ca60 c178b69d PRK: 6f79b401 ea761a01 00b7ca60 c178b69d
Info: (empty) Info: (empty)
L: 32 L: 32
OKM: 922da31d 7e1955f0 6a56464b 5feb7032 f3e99629 5165f6c6 0e08ba43 2dd9058b OKM: 922da31d 7e1955f0 6a56464b 5feb7032 8f7e6f60 aaea5735
c2772e33 17d0a288
PRK: 6f79b401 ea761a01 00b7ca60 c178b69d PRK: 6f79b401 ea761a01 00b7ca60 c178b69d
Info: 696e666f 20737472 696e67 Info: 696e666f 20737472 696e67
L: 256 L: 256
OKM: OKM: 6174e672 12e1234b 6e05bfd3 1043422c df1e34cd 29ee09f5
6174e672 12e1234b 6e05bfd3 1043422c 7ab6dc31 5db7d98d 013ab332 924b7fe9 bd5edb90 db39dcd4 c301e873 d91acbd5 333c8701 6dda05be
0ae9a89d 09c93be4 0ce525e0 b6f0d37d f3818191 3aa3d588 f75a3594 ef7a93ac 3a8faade 2c3992c8 f3221f05 5efb3b51 76dbbe76 90cb4400
d791331e 7929de8b c8c8a6ee 2dd9960e c57fe159 610676a7 c118c4aa c2d34a89 f737298d 638b8026 d527c1e5 81f4e37d a0499c31 abfd8908
6edd3691 f0e922a3 0eecc7b3 ec3eaa91 13d4ee51 8b0a4c7e d0b475df bd07ee02 207160de 343c126e cb460e38 8481fa9f 73391fe6 35a0e4b6
a3470832 da247ef3 b07f9acd 8ddbb765 7369e1c5 2942fab2 11d47c44 0d6818f8 cde3d385 78bcb8b5 5a60952b ac6f840f d87c397a c2477992
29cdd8da d84b825e 1166cbdc dbb13904 d6753de7 6070a145 a8572496 c2808567 ac6cbd64 3100e3ca d660373b 44e2fc0e 4867b15a cd9a070a
9459d801 f14449fb f3430a83 685a4b8d 091dc2fc 85b8209d 7cfd5dbd 39d79a8d 3229ee40 76bf9851 7ccc656f 5bf1f8bb 41ce7e2d 48db670f
d7c6f981 af064ce6 9e58a99f bd9ffd58 a2d93d60 972ec873 f27feaed eed73f0a 1b2921ee 462d9cf1 987eb983 e5c2ce4e a9ceea10 c301dcca
f16c4b57 67daa4bf 6ecc8161 77da31a5 9a9b1972 86259bd6
598d2874 a4f605fb 877bee1b 5529873f
4. Security Considerations 4. Security Considerations
Since CKDF is so closely based on HKDF, the security considerations Since CKDF is so closely based on HKDF, the security considerations
are the same and sections 3, 4 and 5 of [RFC5869] are included here are the same and sections 3, 4 and 5 of [RFC5869] are included here
by reference. by reference.
5. IANA Considerations 5. IANA Considerations
None. None.
 End of changes. 6 change blocks. 
21 lines changed or deleted 24 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/