International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Analysis of Underlying Assumptions in NIST DRBGs

Authors:
Wilson Kan
Download:
URL: http://eprint.iacr.org/2007/345
Search ePrint
Search Google
Abstract: In \cite{NIST}, four different DRBGs are recommended for cryptographic purpose. Each generator is based on some underlying cryptographic concept. The article examines each of the concept to determine what are the necessary and sufficient conditions for the DRBG to be secured in its generation process. In addition, the effects of failure of typical cryptographic requirements of each underlying concept are discussed. From \cite{MC}, permutation based DRBGs are never indistinguishable from a true random source. From \cite{DB}, elliptic based DRBGs are secured given a set of problems regarding elliptic curve remains difficult. This article demostrates that a pseudo-random family is required for both hash based and HMAC based DRBGs.
BibTeX
@misc{eprint-2007-13625,
  title={Analysis of Underlying Assumptions in NIST DRBGs},
  booktitle={IACR Eprint archive},
  keywords={applications / random number generator},
  url={http://eprint.iacr.org/2007/345},
  note={ wkan84@gmail.com 13760 received 4 Sep 2007},
  author={Wilson Kan},
  year=2007
}