Information technology - Security techniques - Key management - Part 6: Key derivation
|Publication Date:||1 October 2016|
|ICS Code (Information coding):||35.040|
This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more "derived" secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.