Paper 2007/345

Analysis of Underlying Assumptions in NIST DRBGs

Wilson Kan

Abstract

In \cite{NIST}, four different DRBGs are recommended for cryptographic purpose. Each generator is based on some underlying cryptographic concept. The article examines each of the concept to determine what are the necessary and sufficient conditions for the DRBG to be secured in its generation process. In addition, the effects of failure of typical cryptographic requirements of each underlying concept are discussed. From \cite{MC}, permutation based DRBGs are never indistinguishable from a true random source. From \cite{DB}, elliptic based DRBGs are secured given a set of problems regarding elliptic curve remains difficult. This article demostrates that a pseudo-random family is required for both hash based and HMAC based DRBGs.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Unknown where it was published
Keywords
random number generator
Contact author(s)
wkan84 @ gmail com
History
2007-09-05: received
Short URL
https://ia.cr/2007/345
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/345,
      author = {Wilson Kan},
      title = {Analysis of Underlying Assumptions in {NIST} {DRBGs}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2007/345},
      year = {2007},
      url = {https://eprint.iacr.org/2007/345}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.