This article describes a key derivation method that greatly simplifies
key distribution issues for network management (NM) applications and
may In some cases relieve NM stations from the need to store any keys
at all. This method is easily generalized for network protocols and ap
plications where several ''masters'' need to talk to a large number of
''slaves.'' it shows a way to cut down on the amount of keys stored w
ith little impact on security, This is especially important when human
users are involved.