摘要 |
<p>A technique for generating a cryptographic key (120) is provided. The technique is particularly useful for protecting the communication between two entities (202, 302; 204, 304) cooperatively running a distributed security operation. The technique comprises providing an input to a key derivation function, the input comprising at least two parameters (106, 108), the first parameter (106) comprising or derived from some cryptographic keys (110, 112) which have been computed by the first entity (202, 302) by running the security operation and the second parameter (108) comprising or derived from a token (116) computed by the second entity (204, 304) for the first entity (202, 302) by running the security operation. The key derivation function is applied to the provided input to generate the desired cryptographic key (120).</p> |