Now that both sides have a "master secrets", the spec shows us how we can derive all the needed session keys we need using the PRF to create a "key block" where we will pull data from.
At last, the paper also presents three different applications of the sorting processor to electronic warfare: detection of threating signal, filtering of useless signal and PRF selection filtering.