Paper 2007/345
Analysis of Underlying Assumptions in NIST DRBGs
Wilson Kan
Abstract
In \cite{NIST}, four different DRBGs are recommended for cryptographic purpose. Each generator is based on some underlying cryptographic concept. The article examines each of the concept to determine what are the necessary and sufficient conditions for the DRBG to be secured in its generation process. In addition, the effects of failure of typical cryptographic requirements of each underlying concept are discussed. From \cite{MC}, permutation based DRBGs are never indistinguishable from a true random source. From \cite{DB}, elliptic based DRBGs are secured given a set of problems regarding elliptic curve remains difficult. This article demostrates that a pseudo-random family is required for both hash based and HMAC based DRBGs.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- random number generator
- Contact author(s)
- wkan84 @ gmail com
- History
- 2007-09-05: received
- Short URL
- https://ia.cr/2007/345
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2007/345, author = {Wilson Kan}, title = {Analysis of Underlying Assumptions in {NIST} {DRBGs}}, howpublished = {Cryptology {ePrint} Archive, Paper 2007/345}, year = {2007}, url = {https://eprint.iacr.org/2007/345} }