Key Derivation Functions (KDF)¶
Key derivation functions are used to turn some amount of shared secret material into uniform random keys suitable for use with symmetric algorithms. An example of an input which is useful for a KDF is a shared secret created using Diffie-Hellman key agreement.
Typically a KDF is also used with a salt and a label. The salt should be some random information which is available to all of the parties that would need to use the KDF; this could be performed by setting the salt to some kind of session identifier, or by having one of the parties generate a random salt and including it in a message.
The label is used to bind the KDF output to some specific context. For instance if you were using the KDF to derive a specific key referred to as the “message key” in the protocol description, you might use a label of “FooProtocol v2 MessageKey”. This labeling ensures that if you accidentally use the same input key and salt in some other context, you still use different keys in the two contexts.
-
class KDF¶
-
std::unique_ptr<KDF> KDF::create(const std::string &algo)¶
Create a new KDF object. Returns nullptr if the named key derivation function was not available
-
std::unique_ptr<KDF> KDF::create_or_throw(const std::string &algo)¶
Create a new KDF object. Throws an exception if the named key derivation function was not available
-
template<concepts::resizable_byte_buffer T = secure_vector<uint8_t>>
T derive_key(size_t key_len, std::span<const uint8_t> secret, std::span<const uint8_t> salt, std::span<const uint8_t> label) const¶ This version is parameterized to the output buffer type, so it can be used to return a
std::vector
, asecure_vector
, or anything else satisfying theresizable_byte_buffer
concept.
-
secure_vector<uint8_t> derive_key(const uint8_t secret[], size_t secret_len, const uint8_t salt[], size_t salt_len, const uint8_t label[], size_t label_len) const¶
-
secure_vector<uint8_t> derive_key(size_t key_len, const std::vector<uint8_t> &secret, const std::vector<uint8_t> &salt, const std::vector<uint8_t> &label) const¶
-
secure_vector<uint8_t> derive_key(size_t key_len, const std::vector<uint8_t> &secret, const uint8_t *salt, size_t salt_len) const¶
-
secure_vector<uint8_t> derive_key(size_t key_len, const uint8_t *secret, size_t secret_len, const std::string &salt) const¶
All variations on the same theme. Deterministically creates a uniform random value from secret, salt, and label, whose meaning is described above.
-
std::unique_ptr<KDF> KDF::create(const std::string &algo)¶
Code Example¶
An example demonstrating using the API to hash a secret using HKDF
#include <botan/hex.h>
#include <botan/kdf.h>
#include <iostream>
int main() {
// Replicate a test from RFC 5869
// https://www.rfc-editor.org/rfc/rfc5869#appendix-A.1
const std::vector<uint8_t> input_secret(22, 0x0b);
const std::vector<uint8_t> salt = Botan::hex_decode("000102030405060708090a0b0c");
const std::vector<uint8_t> label = Botan::hex_decode("f0f1f2f3f4f5f6f7f8f9");
const size_t derived_key_len = 42;
auto kdf = Botan::KDF::create_or_throw("HKDF(SHA-256)");
auto derived_key = kdf->derive_key(derived_key_len, input_secret, salt, label);
// OKM = 0x3cb25f25faacd57a90434f64d0362f2a...
std::cout << Botan::hex_encode(derived_key) << '\n';
}
Available KDFs¶
Botan includes many different KDFs simply because different protocols and. standards have created subtly different approaches to this problem. For new code, use HKDF which is conservative, well studied, widely implemented and NIST approved. There is no technical reason (besides compatability) to choose any other KDF.
HKDF¶
Defined in RFC 5869, HKDF uses HMAC to process inputs. Also available are variants HKDF-Extract and HKDF-Expand. HKDF is the combined Extract+Expand operation. Use the combined HKDF unless you need compatibility with some other system.
Available if BOTAN_HAS_HKDF
is defined.
Algorithm specification names:
HKDF(<MessageAuthenticationCode|HashFunction>)
, e.g.HKDF(HMAC(SHA-256))
HKDF-Extract(<MessageAuthenticationCode|HashFunction>)
HKDF-Expand(<MessageAuthenticationCode|HashFunction>)
If a HashFunction
is provided as an argument,
it will create HMAC(HashFunction)
as the MessageAuthenticationCode
.
I.e. HKDF(SHA-256)
will result in HKDF(HMAC(SHA-256))
.
KDF1-18033¶
KDF1 from ISO 18033-2. Very similar to (but incompatible with) KDF2.
Available if BOTAN_HAS_KDF1_18033
is defined.
Algorithm specification name:
KDF1-18033(<HashFunction>)
, e.g. KDF1-18033(SHA-512)
KDF1¶
KDF1 from IEEE 1363. It can only produce an output at most the length of the hash function used.
Available if BOTAN_HAS_KDF1
is defined.
Algorithm specification name:
KDF1(<HashFunction>)
, e.g. KDF1(SHA-512)
KDF2¶
KDF2 comes from IEEE 1363. It uses a hash function.
Available if BOTAN_HAS_KDF2
is defined.
Algorithm specification name:
KDF2(<HashFunction>)
, e.g. KDF2(SHA-512)
X9.42 PRF¶
A KDF from ANSI X9.42. Sometimes used for Diffie-Hellman. However it is overly complicated and is fixed to use only SHA-1.
Available if BOTAN_HAS_X942_PRF
is defined.
Warning
X9.42 PRF is deprecated and will be removed in a future major release.
Algorithm specification name:
X9.42-PRF(<OID>)
,
e.g. X9.42-PRF(KeyWrap.TripleDES)
, X9.42-PRF(1.2.840.113549.1.9.16.3.7)
SP800-56A¶
KDF from NIST SP 800-56Ar2 or One-Step KDF of SP 800-56Cr2.
Available if BOTAN_HAS_SP800_56A
is defined.
Algorithm specification names:
SP800-56A(<HashFunction>)
, e.g.SP800-56A(SHA-256)
SP800-56A(HMAC(<HashFunction>))
, e.g.SP800-56A(HMAC(SHA-256))
SP800-56A(KMAC-128)
orSP800-56A(KMAC-256)
SP800-56C¶
Two-Step KDF from NIST SP 800-56Cr2.
Available if BOTAN_HAS_SP800_56C
is defined.
Algorithm specification name:
SP800-56C(<MessageAuthenticationCode|HashFunction>)
,
e.g. SP800-56C(HMAC(SHA-256))
If a HashFunction
is provided as an argument,
it will create HMAC(HashFunction)
as the MessageAuthenticationCode
.
I.e. SP800-56C(SHA-256)
will result in SP800-56C(HMAC(SHA-256))
.
SP800-108¶
KDFs from NIST SP 800-108. Variants include “SP800-108-Counter”, “SP800-108-Feedback” and “SP800-108-Pipeline”.
Available if BOTAN_HAS_SP800_108
is defined.
Algorithm specification names:
SP800-108-Counter(<MessageAuthenticationCode|HashFunction>)
, e.g.SP800-108-Counter(HMAC(SHA-256))
SP800-108-Feedback(<MessageAuthenticationCode|HashFunction>)
SP800-108-Pipeline(<MessageAuthenticationCode|HashFunction>)
If a HashFunction
is provided as an argument,
it will create HMAC(HashFunction)
as the MessageAuthenticationCode
.
I.e. SP800-108-Counter(SHA-256)
will result in SP800-108-Counter(HMAC(SHA-256))
.
TLS 1.2 PRF¶
Implementation of the Pseudo-Random Function as used in TLS 1.2.
Available if BOTAN_HAS_TLS_V12_PRF
is defined.
Algorithm specification name:
TLS-12-PRF(<MessageAuthenticationCode|HashFunction>)
,
e.g. TLS-12-PRF(HMAC(SHA-256))
If a HashFunction
is provided as an argument,
it will create HMAC(HashFunction)
as the MessageAuthenticationCode
.
I.e. TLS-12-PRF(SHA-256)
will result in TLS-12-PRF(HMAC(SHA-256))
.