|国家预印本平台
首页|A Comparative Study and Implementation of Key Derivation Functions Standardized by NIST and IEEE

A Comparative Study and Implementation of Key Derivation Functions Standardized by NIST and IEEE

A Comparative Study and Implementation of Key Derivation Functions Standardized by NIST and IEEE

来源:Arxiv_logoArxiv
英文摘要

Since many applications and services require pseudorandom numbers (PRNs), it is feasible to generate specific PRNs under given key values and input messages using Key Derivation Functions (KDFs). These KDFs are primarily constructed based on Message Authentication Codes (MACs), where the MAC serves as a core component in the generation of pseudorandom numbers. In light of this, the study first examines three MAC algorithms defined by the National Institute of Standards and Technology (NIST): the Keyed-Hash Message Authentication Code (HMAC), the Cipher-based Message Authentication Code (CMAC), and the Keccak-based Message Authentication Code (KMAC). Subsequently, the study explores KDFs based on these MACs, including the Counter Mode KDF, the KMAC-based KDF, and the KDF defined in IEEE 1609.2.1. In experiments, the computation times for generating MACs and the corresponding pseudorandom numbers using each KDF are evaluated. The study further analyzes the advantages, disadvantages, and applicable scenarios for each method. Experimental results indicate that the CMAC and the CMAC-based KDF exhibit the shortest computation times, averaging approximately 0.007 milliseconds and 0.014 milliseconds, respectively.

Abel C. H. Chen

计算技术、计算机技术

Abel C. H. Chen.A Comparative Study and Implementation of Key Derivation Functions Standardized by NIST and IEEE[EB/OL].(2025-06-23)[2025-07-21].https://arxiv.org/abs/2507.06244.点此复制

评论