Commit

Comments (0)

Files changed (1)

File draft-ietf-6tisch-minimal-security.mkd Modified

View file
  • Ignore whitespace
  • Hide word diff
 document.  Additional work, such as in
 {{I-D.richardson-6tisch-minimal-rekey}} can be used.
 
+# Key Derivations
+
+When EDHOC is used to derive keys, the cost of the assymetric
+operation can be amortized over any additional connections that may be
+required between the node (during or after joining) and the JRC.
+
+Each application SHOULD use a unique session key.  EDHOC was desired
+with this in mind.  In order to accomplish this, the EDHOC key
+derivation algorithm can be run with a different label.  Other
+users of this key MUST define the key.
+
 # Security Considerations
 
 In case PSKs are used, this document mandates that the pledge and JRC are