<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://devzone.nordicsemi.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Clarification Required on Key Type and Algorithm for Storing ECDH-Derived Key Material in KMU for HKDF and HMAC (CRACEN)</title><link>https://devzone.nordicsemi.com/f/nordic-q-a/127613/clarification-required-on-key-type-and-algorithm-for-storing-ecdh-derived-key-material-in-kmu-for-hkdf-and-hmac-cracen</link><description>Device: nRF54L15 (CRACEN + KMU) 
 SDK: nRF Connect SDK v3.2.1 
 
 Hi Team, 
 I have a question regarding storing ECDH key agreement material in KMU and using it for HKDF-SHA256 derivation and HMAC generation using CRACEN . 
 
 Use Case 
 We are performing</description><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><lastBuildDate>Fri, 27 Mar 2026 13:51:46 GMT</lastBuildDate><atom:link rel="self" type="application/rss+xml" href="https://devzone.nordicsemi.com/f/nordic-q-a/127613/clarification-required-on-key-type-and-algorithm-for-storing-ecdh-derived-key-material-in-kmu-for-hkdf-and-hmac-cracen" /><item><title>RE: Clarification Required on Key Type and Algorithm for Storing ECDH-Derived Key Material in KMU for HKDF and HMAC (CRACEN)</title><link>https://devzone.nordicsemi.com/thread/564196?ContentTypeID=1</link><pubDate>Fri, 27 Mar 2026 13:51:46 GMT</pubDate><guid isPermaLink="false">137ad170-7792-4731-bb38-c0d22fbe4515:0104f739-b736-48ac-93e0-915271cfd38a</guid><dc:creator>Amanda Hsieh</dc:creator><description>&lt;p&gt;Hi Aasim,&lt;/p&gt;
[quote user=""]&lt;p&gt;I reviewed the KMU PSA Crypto programming model and the list of supported key types here:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/app_dev/device_guides/kmu_guides/kmu_psa_crypto_api_prog_model.html#key_types_that_can_be_stored_in_the_kmu" target="_new"&gt;https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/app_dev/device_guides/kmu_guides/kmu_psa_crypto_api_prog_model.html#key_types_that_can_be_stored_in_the_kmu&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;However:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;I &lt;strong&gt;could not find a key type or algorithm entry corresponding to HKDF-SHA256&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;PSA_KEY_TYPE_DERIVE&lt;/code&gt; combined with &lt;code&gt;PSA_ALG_HKDF(SHA256)&lt;/code&gt; appears unsupported when importing into KMU&lt;/li&gt;
&lt;li&gt;This results in &lt;code&gt;PSA_ERROR_NOT_SUPPORTED&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;According to PSA Crypto API design, implementations may reject unsupported policy combinations during key creation if the platform cannot support them.&lt;/p&gt;[/quote]
&lt;p&gt;That&amp;#39;s correct.&lt;/p&gt;
&lt;p&gt;For your questions, please use &lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/app_dev/device_guides/kmu_guides/kmu_psa_crypto_api_prog_model.html#key_types_that_can_be_stored_in_the_kmu"&gt;the supported&amp;nbsp;&lt;/a&gt;&lt;span&gt;&lt;a href="https://docs.nordicsemi.com/bundle/ncs-latest/page/nrf/app_dev/device_guides/kmu_guides/kmu_psa_crypto_api_prog_model.html#key_types_that_can_be_stored_in_the_kmu"&gt;key types that can be stored in the KMU in the list&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Regards,&lt;br /&gt;Amanda H.&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>