Draft SP 800-56C Rev. 2, Recommendation for Key
Total Page:16
File Type:pdf, Size:1020Kb
Withdrawn Draft Warning Notice The attached draft document has been withdrawn, and is provided solely for historical purposes. It has been superseded by the document identified below. Withdrawal Date August 18, 2020 Original Release Date March 24, 2020 Superseding Document Status Final Series/Number NIST Special Publication (SP) 800-56C Revision 2 Title Recommendation for Key-Derivation Methods in Key- Establishment Schemes Publication Date August 2020 DOI https://doi.org/10.6028/NIST.SP.800-56Cr2 CSRC URL https://csrc.nist.gov/publications/detail/sp/800-56c/rev-2/final Additional Information 1 Draft NIST Special Publication 800-56C 2 Revision 2 3 Recommendation for Key-Derivation 4 Methods in Key-Establishment Schemes 5 6 7 Elaine Barker 8 Lily Chen 9 Richard Davis 10 11 12 13 14 15 16 This publication is available free of charge from: 17 https://doi.org/10.6028/NIST.SP.800-56Cr2-draft 18 19 20 C O M P U T E R S E C U R I T Y 21 22 23 Draft NIST Special Publication 800-56C 24 Revision 2 25 Recommendation for Key-Derivation 26 Methods in Key-Establishment Schemes 27 28 29 Elaine Barker 30 Lily Chen 31 Computer Security Division 32 Information Technology Laboratory 33 34 Richard Davis 35 National Security Agency 36 37 38 39 40 This publication is available free of charge from: 41 https://doi.org/10.6028/NIST.SP.800-56Cr2-draft 42 43 44 45 March 2020 46 47 48 49 50 51 U.S. Department of Commerce 52 Wilbur L. Ross, Jr., Secretary 53 54 National Institute of Standards and Technology 55 Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology 56 Authority 57 This publication has been developed by NIST in accordance with its statutory responsibilities under the 58 Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law 59 (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including 60 minimum requirements for federal information systems, but such standards and guidelines shall not apply 61 to national security systems without the express approval of appropriate federal officials exercising policy 62 authority over such systems. This guideline is consistent with the requirements of the Office of Management 63 and Budget (OMB) Circular A-130. 64 Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and 65 binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these 66 guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, 67 Director of the OMB, or any other federal official. This publication may be used by nongovernmental 68 organizations on a voluntary basis and is not subject to copyright in the United States. Attribution would, 69 however, be appreciated by NIST. 70 National Institute of Standards and Technology Special Publication 800-56C Revision 2 71 Natl. Inst. Stand. Technol. Spec. Publ. 800-56C Rev. 2, 41 pages (March 2020) 72 CODEN: NSPUE2 73 This publication is available free of charge from: 74 https://doi.org/10.6028/NIST.SP.800-56Cr2-draft 75 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an 76 experimental procedure or concept adequately. Such identification is not intended to imply recommendation or 77 endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best 78 available for the purpose. 79 There may be references in this publication to other publications currently under development by NIST in accordance 80 with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, 81 may be used by federal agencies even before the completion of such companion publications. Thus, until each 82 publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For 83 planning and transition purposes, federal agencies may wish to closely follow the development of these new 84 publications by NIST. 85 Organizations are encouraged to review all draft publications during public comment periods and provide feedback to 86 NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at 87 https://csrc.nist.gov/publications. 88 Public comment period: March 24, 2020 through May 15, 2020 89 90 National Institute of Standards and Technology 91 Attn: Computer Security Division, Information Technology Laboratory 92 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930 93 Email: [email protected] 94 95 All comments are subject to release under the Freedom of Information Act (FOIA). 96 NIST SP 800-56C REV. 2 (DRAFT) RECOMMENDATION FOR KEY DERIVATION METHODS IN KEY ESTABLISHMENT SCHEMES 97 Reports on Computer Systems Technology 98 The Information Technology Laboratory (ITL) at the National Institute of Standards and 99 Technology (NIST) promotes the U.S. economy and public welfare by providing technical 100 leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test 101 methods, reference data, proof of concept implementations, and technical analyses to advance the 102 development and productive use of information technology. ITL’s responsibilities include the 103 development of management, administrative, technical, and physical standards and guidelines for 104 the cost-effective security and privacy of other than national security-related information in federal 105 information systems. The Special Publication 800-series reports on ITL’s research, guidelines, and 106 outreach efforts in information system security, and its collaborative activities with industry, 107 government, and academic organizations. 108 109 Abstract 110 This Recommendation specifies techniques for the derivation of keying material from a shared 111 secret established during a key-establishment scheme defined in NIST Special Publications 800- 112 56A or 800-56B. 113 114 Keywords 115 Expansion; extraction; extraction-then-expansion; hash function; key derivation; key 116 establishment; message authentication code. 117 ii NIST SP 800-56C REV. 2 (DRAFT) RECOMMENDATION FOR KEY DERIVATION METHODS IN KEY ESTABLISHMENT SCHEMES 118 Acknowledgements 119 The authors gratefully acknowledge the contributions on this and previous versions of this 120 document by their NIST colleagues (Quynh Dang, Sharon Keller, John Kelsey, Allen Roginsky, 121 Meltem Sonmez Turan, Apostol Vassilev, and Tim Polk) and by Miles Smid, formerly of Orion 122 Security Solutions. 123 The authors also gratefully appreciate the thoughtful and instructive comments received during the 124 public comment periods, which helped to improve the quality of this publication. 125 126 Conformance Testing 127 Conformance testing for implementations of the functions that are specified in this publication will 128 be conducted within the framework of the Cryptographic Algorithm Validation Program (CAVP) 129 and the Cryptographic Module Validation Program (CMVP). The requirements on these 130 implementations are indicated by the word “shall.” Some of these requirements may be out of 131 scope for CAVP or CMVP validation testing and are therefore the responsibility of entities using, 132 implementing, installing, or configuring applications that incorporate this Recommendation. 133 iii NIST SP 800-56C REV. 2 (DRAFT) RECOMMENDATION FOR KEY DERIVATION METHODS IN KEY ESTABLISHMENT SCHEMES 134 Call for Patent Claims 135 This public review includes a call for information on essential patent claims (claims whose use 136 would be required for compliance with the guidance or requirements in this Information 137 Technology Laboratory (ITL) draft publication). Such guidance and/or requirements may be 138 directly stated in this ITL Publication or by reference to another publication. This call also includes 139 disclosure, where known, of the existence of pending U.S. or foreign patent applications relating 140 to this ITL draft publication and of any relevant unexpired U.S. or foreign patents. 141 ITL may require from the patent holder, or a party authorized to make assurances on its behalf, in 142 written or electronic form, either: 143 a) assurance in the form of a general disclaimer to the effect that such party does not hold and 144 does not currently intend holding any essential patent claim(s); or 145 b) assurance that a license to such essential patent claim(s) will be made available to 146 applicants desiring to utilize the license for the purpose of complying with the guidance or 147 requirements in this ITL draft publication either: 148 i. under reasonable terms and conditions that are demonstrably free of any unfair 149 discrimination; or 150 ii. without compensation and under reasonable terms and conditions that are 151 demonstrably free of any unfair discrimination. 152 Such assurance shall indicate that the patent holder (or third party authorized to make assurances 153 on its behalf) will include in any documents transferring ownership of patents subject to the 154 assurance, provisions sufficient to ensure that the commitments in the assurance are binding on 155 the transferee, and that the transferee will similarly include appropriate provisions in the event of 156 future transfers with the goal of binding each successor-in-interest. 157 The assurance shall also indicate that it is intended to be binding on successors-in-interest 158 regardless of whether