Cryptology ePrint Archive: Report 2007/345

Analysis of Underlying Assumptions in NIST DRBGs

Wilson Kan

Abstract: In \cite{NIST}, four different DRBGs are recommended for cryptographic purpose. Each generator is based on some underlying cryptographic concept. The article examines each of the concept to determine what are the necessary and sufficient conditions for the DRBG to be secured in its generation process. In addition, the effects of failure of typical cryptographic requirements of each underlying concept are discussed.

From \cite{MC}, permutation based DRBGs are never indistinguishable from a true random source. From \cite{DB}, elliptic based DRBGs are secured given a set of problems regarding elliptic curve remains difficult. This article demostrates that a pseudo-random family is required for both hash based and HMAC based DRBGs.

Category / Keywords: applications / random number generator

Date: received 4 Sep 2007

Contact author: wkan84 at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20070905:065749 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]