#crypto #hkdf #kdf

no-std hkdf

HMAC-based Extract-and-Expand Key Derivation Function (HKDF)

19 releases (11 breaking)

0.12.3 Feb 17, 2022
0.12.0 Dec 7, 2021
0.11.0 Apr 29, 2021
0.10.0 Oct 26, 2020
0.1.0 Jan 3, 2015

#692 in Cryptography

Download history 82134/week @ 2022-04-22 83133/week @ 2022-04-29 94889/week @ 2022-05-06 94900/week @ 2022-05-13 88247/week @ 2022-05-20 87490/week @ 2022-05-27 97983/week @ 2022-06-03 105244/week @ 2022-06-10 108390/week @ 2022-06-17 114032/week @ 2022-06-24 109753/week @ 2022-07-01 109447/week @ 2022-07-08 123390/week @ 2022-07-15 121135/week @ 2022-07-22 132240/week @ 2022-07-29 136617/week @ 2022-08-05

534,591 downloads per month
Used in 585 crates (93 directly)

MIT/Apache

170KB
228 lines

RustCrypto: HKDF

crate Docs Apache2/MIT licensed Rust Version Project Chat Build Status

Pure Rust implementation of the HMAC-based Extract-and-Expand Key Derivation Function (HKDF) generic over hash function.

Usage

The most common way to use HKDF is as follows: you provide the Initial Key Material (IKM) and an optional salt, then you expand it (perhaps multiple times) into some Output Key Material (OKM) bound to an "info" context string.

use sha2::Sha256;
use hkdf::Hkdf;
use hex_literal::hex;

let ikm = hex!("0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b");
let salt = hex!("000102030405060708090a0b0c");
let info = hex!("f0f1f2f3f4f5f6f7f8f9");

let hk = Hkdf::<Sha256>::new(Some(&salt[..]), &ikm);
let mut okm = [0u8; 42];
hk.expand(&info, &mut okm)
    .expect("42 is a valid length for Sha256 to output");

let expected = hex!("
    3cb25f25faacd57a90434f64d0362f2a
    2d2d0a90cf1a5a4c5db02d56ecc4c5bf
    34007208d5b887185865
");
assert_eq!(okm, expected);

Normally the PRK (Pseudo-Random Key) remains hidden within the HKDF object, but if you need to access it, use Hkdf::extract instead of Hkdf::new.

let (prk, hk) = Hkdf::<Sha256>::extract(Some(&salt[..]), &ikm);
let expected = hex!("
    077709362c2e32df0ddc3f0dc47bba63
    90b6c73bb50f9c3122ec844ad7c2b3e5
");
assert_eq!(prk[..], expected[..]);

If you already have a strong key to work from (uniformly-distributed and long enough), you can save a tiny amount of time by skipping the extract step. In this case, you pass a Pseudo-Random Key (PRK) into the Hkdf::from_prk constructor, then use the resulting Hkdf object as usual.

let prk = hex!("
    077709362c2e32df0ddc3f0dc47bba63
    90b6c73bb50f9c3122ec844ad7c2b3e5
");

let hk = Hkdf::<Sha256>::from_prk(&prk).expect("PRK should be large enough");
let mut okm = [0u8; 42];
hk.expand(&info, &mut okm)
    .expect("42 is a valid length for Sha256 to output");

let expected = hex!("
    3cb25f25faacd57a90434f64d0362f2a
    2d2d0a90cf1a5a4c5db02d56ecc4c5bf
    34007208d5b887185865
");
assert_eq!(okm, expected);

Dependencies

~360KB