{"draft":"draft-smyshlyaev-gost-usage-19","doc_id":"RFC7836","title":"Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012","authors":["S. Smyshlyaev, Ed.","E. Alekseev","I. Oshkin","V. Popov","S. Leontiev","V. Podobaev","D. Belyavsky"],"format":["ASCII","HTML"],"page_count":"32","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"INDEPENDENT","abstract":"The purpose of this document is to make the specifications of the\r\ncryptographic algorithms defined by the Russian national standards\r\nGOST R 34.10-2012 and GOST R 34.11-2012 available to the Internet\r\ncommunity for their implementation in the cryptographic protocols\r\nbased on the accompanying algorithms.\r\n\r\nThese specifications define the pseudorandom functions, the key\r\nagreement algorithm based on the Diffie-Hellman algorithm and a hash\r\nfunction, the parameters of elliptic curves, the key derivation\r\nfunctions, and the key export functions.","pub_date":"March 2016","keywords":["HMAC","PRF","key agreement","VKO","key exchange","key derivation","KDF","key tree","elliptic curve","Weierstrass","twisted Edwards","TLS","IPsec","IKE","IKEv2"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC7836","errata_url":null}