2006
DOI: 10.17487/rfc4615
|View full text |Cite
|
Sign up to set email alerts
|

The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)

Abstract: Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…COAP_PSK is a 16-byte length key which is computed using AES-CMAC-PRF-128 [ 77 ] as Key Derivation Function (KDF), which, in turn, uses AES-CMAC-128 [ 78 ]. Both primitives use AES-128 [ 79 ] as building block since it is widely used in constrained devices.…”
Section: The Bootstrapping Service: Coap-eapmentioning
confidence: 99%
See 1 more Smart Citation
“…COAP_PSK is a 16-byte length key which is computed using AES-CMAC-PRF-128 [ 77 ] as Key Derivation Function (KDF), which, in turn, uses AES-CMAC-128 [ 78 ]. Both primitives use AES-128 [ 79 ] as building block since it is widely used in constrained devices.…”
Section: The Bootstrapping Service: Coap-eapmentioning
confidence: 99%
“…The AES-CMAC-PRF-128 is defined in [ 77 ]. This function uses AES-CMAC-128 as a building block; The MSK is exported by the EAP method; “IETF_COAP_PSK” is the ASCII code representation of the non-NULL terminated string (excluding the double quotes around it).…”
Section: The Bootstrapping Service: Coap-eapmentioning
confidence: 99%
“…We implemented each DSSE scheme discussed in Section 3 in C++ using the Crypto++ [25] open source library. We used AES to generate block ciphers and constructed a pseudorandom function [26]. The hash function was implemented using HMAC SHA256 and CMAC AES128.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…However, for the convenience of the administrators, a specification may not want to require the entry of a PSK be of exactly 16 bytes. Instead, a specification may call for a key prep routine that could handle a variable-length PSK, one that might be less or more than 16 bytes (see [RFC4615], Section 3, as an example). That key prep routine would derive a key of exactly the required length, thus, be suitable as a seed to the PRF.…”
Section: Use Strong Keysmentioning
confidence: 99%