====== Namespace WvdS.System.Security.Cryptography.KeyDerivation ====== Contiene classi per la derivazione delle chiavi (KDF) con supporto PQ. ---- ===== Classi ===== ^ Classe ^ Descrizione ^ | [[.:keyderivationextensions|KeyDerivationExtensions]] | Funzioni KDF (HKDF, PBKDF2, Argon2id) | | [[.:hybridkeymaterial|HybridKeyMaterial]] | Container per chiavi derivate | | [[.:tlskeymaterial|TlsKeyMaterial]] | Materiale chiavi stile TLS | | [[.:tls13keyschedule|Tls13KeySchedule]] | Key Schedule TLS 1.3 | ---- ===== KDF supportate ===== ^ Funzione ^ Standard ^ Utilizzo ^ | HKDF | RFC 5869((RFC 5869: https://datatracker.ietf.org/doc/html/rfc5869)) | Chiavi di sessione da Shared Secret | | PBKDF2 | RFC 8018((RFC 8018: https://datatracker.ietf.org/doc/html/rfc8018)) | Chiavi basate su password | | Argon2id | RFC 9106((RFC 9106: https://datatracker.ietf.org/doc/html/rfc9106)) | KDF memory-hard | ---- ===== Esempio ===== using WvdS.System.Security.Cryptography.KeyDerivation; byte[] sharedSecret = /* da ML-KEM */; byte[] salt = RandomNumberGenerator.GetBytes(32); // HKDF per chiavi di sessione byte[] aesKey = KeyDerivationExtensions.DeriveKey( sharedSecret, outputLength: 32, salt: salt, info: Encoding.UTF8.GetBytes("AES-256-GCM")); // Derivazione chiavi ibrida byte[] hybridKey = KeyDerivationExtensions.DeriveHybridKey( classicSecret: ecdhSecret, pqSecret: mlKemSecret, outputLength: 32); ---- ===== Vedi anche ===== * [[..:keyexchange:start|Namespace KeyExchange]] * [[..:encryption:start|Namespace Encryption]] * [[..:..:..:start|Panoramica API]] {{tag>namespace kdf hkdf pbkdf2 argon2id}} ---- //Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional//