Paper 2025/815

Security Analysis of NIST Key Derivation Using Pseudorandom Functions

Yaobin Shen, Xiamen University, Xiamen, China
Lei Wang, Shanghai Jiao Tong University
Dawu Gu, Shanghai Jiao Tong University
Abstract

Key derivation functions can be used to derive variable-length random strings that serve as cryptographic keys. They are integral to many widely-used communication protocols such as TLS, IPsec and Signal. NIST SP 800-108 specifies several key derivation functions based on pseudorandom functions such as \mode{CMAC} and \mode{HMAC}, that can be used to derive additional keys from an existing cryptographic key. This standard either explicitly or implicitly requests their KDFs to be variable output length pseudorandom function, collision resistant, and preimage resistant. Yet, since the publication of this standard dating back to the year of 2008, until now, there is no formal analysis to justify these security properties of KDFs. In this work, we give the formal security analysis of key derivation functions in NIST SP 800-108. We show both positive and negative results regarding these key derivation functions. For KCTR-CMAC, KFB-CMAC, and KDPL-CMAC that are key derivation functions based on CMAC in counter mode, feedback mode, and double-pipeline mode respectively, we prove that all of them are secure variable output length pseudorandom functions and preimage resistance. We show that KFB-CMAC and KDPL-CMAC are collision resistance. While for KCTR-CMAC, we can mount collision attack against it that requires only six block cipher queries and can succeed with probability 1/4. For KCTR-HMAC, KFB-HMAC, and KDPL-HMAC that are key derivation functions based on HMAC in modes, we show that all of them behave like variable output length pseudorandom functions. When the key of these key derivation functions is of variable length, they suffer from collision attacks. For the case when the key of these key derivation function is of fixed length and less than $d-1$ bits where $d$ is the input block size of the underlying compression function, we can prove that they are collision resistant and preimage resistant.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
Key derivation functionsCMACHMACPseudorandom function
Contact author(s)
yaobins180 @ gmail com
wanglei_hb @ sjtu edu cn
dwgu @ sjtu edu cn
History
2025-05-09: approved
2025-05-07: received
See all versions
Short URL
https://ia.cr/2025/815
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/815,
      author = {Yaobin Shen and Lei Wang and Dawu Gu},
      title = {Security Analysis of {NIST} Key Derivation Using Pseudorandom Functions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/815},
      year = {2025},
      url = {https://eprint.iacr.org/2025/815}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.