A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Verified Correctness and Security of mbedTLS HMAC-DRBG
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS '17
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof. ...
That proof composes with an existing C compiler correctness proof to guarantee, end-to-end, that the machine language program gives strong pseudorandomness. ...
The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the o cial policies or endorsements, either expressed or implied, of DARPA ...
doi:10.1145/3133956.3133974
dblp:conf/ccs/YeGSBPA17
fatcat:ob5xnocvrvc2vftmnv73bwrc3i
Entropy And Randomness: From Analogic To Quantum World
2020
IEEE Access
The observer has access to a sample, of a certain size, and based on it he will estimate the minimum value of the entropy, in the situations in which the variables resulting from the measurement process ...
The critical element on which the security of information is based is the cryptographic key (usually a binary sequence). ...
To restore confidence in encryption standards, NIST reopened the public analysis process for NIST SP 800-90A. ...
doi:10.1109/access.2020.2988658
fatcat:guqtdlqc7nch5fw56gyh2gbj6q
Randomness Classes in Bugs Framework (BF): True-Random Number Bugs (TRN) and Pseudo-Random Number Bugs (PRN)
2018
2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC)
The Bugs Framework (BF) comprises rigorous definitions and (static) attributes of bug classes, along with their related dynamic properties, such as proximate and secondary causes, consequences and sites ...
Formalization of randomness bugs would help researchers and practitioners identify them and avoid security failures. ...
They are subject to the requirements in NIST SP 800-90A [8] , NIST SP 800-90B [9] and NIST SP 800-90C [10] . ...
doi:10.1109/compsac.2018.00110
dblp:conf/compsac/BojanovaYB18
fatcat:6olrpubq3ngrnoaralnm5el4c4
Building a Modern TRNG
2020
Proceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security
This design is informed by lessons learned from earlier mainstream ISAs, recently introduced SP 800-90B and FIPS 140-3 entropy audit requirements, AIS 31 and Common Criteria, current and emerging cryptographic ...
Many of the architectural choices are a result of quantitative observations about random number generators in secure microcontrollers, the Linux kernel, and cryptographic libraries. ...
This work was supported in part by Innovate UK (R&D Project Ref.: 105747), and by EPSRC (Grant No.: EP/R012288/1, under the RISE programme.) ...
doi:10.1145/3411504.3421212
fatcat:w4ec6p3nkbcbbkjngtwbuzalga
The Mathematics Community and the NSA: Encryption and the NSA Role in International Standards
2015
Notices of the American Mathematical Society
NSA mathematicians remain steadfast in advocating secure international standards. Nevertheless, we are mindful that there has been considerable discussion regarding NIST publication SP 800-90A. ...
Shortly thereafter, NIST negotiated with ANSI to use the ANSI Random Number Generation Standard as the basis for an NIST Random Number Generation Standard. ...
doi:10.1090/noti1213
fatcat:pcd7wookl5fu5nmrvnmees6xxq
Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher
2014
Journal of information and communication convergence engineering
The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the algorithm, and introducing a key refreshment scheme. ...
In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv's Tmote Sky, a popular wireless sensor mote based on the Berkeley ...
SP 800-90A NIST SP 800-90A specifies the recommendation for random number generation using deterministic random bit generators (DRBGs) [14] . ...
doi:10.6109/jicce.2014.12.4.237
fatcat:vnp2iwln4fdozavudabzdx2vsq
Windows and Linux Random Number Generation Process: A Comparative Analysis
2015
International Journal of Computer Applications
In this paper, we explore and analyze the structure and functions of Random Number Generator (RNG) in Windows and Linux opreating systems. And compare the capabilities of their RNGs. ...
It expected that this research would contribute to awareness of the quality and security of the random number generators implemented in Linux and Windows operating systems. ...
more acceptable standards such as NIST 800-90A. ...
doi:10.5120/19847-1710
fatcat:ofmedstigbhxhos56gqo6mtlvi
Stochastic Cell- and Bit-Discard Technique to Improve Randomness of a TRNG
2022
Electronics
surpassing the NIST 800-22a requirements. ...
Targeting high-level cryptography systems complying with the NIST 800-22a requirements, the proposed algorithm significantly improves the Hamming weight (HW) and successfully passes the NIST criteria while ...
From a cryptographical perspective, SP 800-90A, B, and C documents written by US NIST clearly describe how a TRNG should be operated and evaluated [19] [20] [21] . ...
doi:10.3390/electronics11111735
fatcat:rjwmaozmqrbpndfudhn7kdfccy
Elliptic Curve Pseudorandom Bit Generator with Maximum Period Sequences
2021
International Scientific Journal of Computing
The application of transformations in a group of points of elliptic and hypereliptic curves is an important direction for the designing of cryptographically stable pseudo-random sequences generators. ...
Pseudo-random number generator is an important mechanism for cryptographic information protection. ...
DUAL ELLIPTIC CURVE DETERMINISTIC RANDOM BIT GENERATOR In 2012, the US National Institute of Standards and Technology (NIST) approved the NIST Special Publication 800-90A [19] . ...
doi:10.47839/ijc.20.4.2436
fatcat:his5ag4dizbt3hzu7cl65f5fhm
Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm
2020
Sensors
In the context of growing the adoption of advanced sensors and systems for active vehicle safety and driver assistance, an increasingly important issue is the security of the information exchanged between ...
The IP-core has been validated thanks to the official NIST Statistical Test Suite, in order to evaluate the degree of randomness of the numbers generated in output. ...
are collected in the NIST SP 800-90A Rev.1 pubblication [6] user is always able to run a command with an associated personalization string, which needs not to be secret but it contributes to the internal ...
doi:10.3390/s20071869
pmid:32230946
fatcat:h4y6e7vfunhmnkzjbwhyxktiwy
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
[article]
2020
arXiv
pre-print
The obtained pseudorandom bits are tested with NIST statistical tests and it also could fulfill the up-to-date standards. ...
Moreover, a 256 × 256 grayscale images are encrypted with the obtained pseudorandom bits following by necessary analysis of the cipher images for security prove. ...
ACKNOWLEDGMENT The prepared work has been supported financially by Shaqra University, Saudi Arabia and Sohag University, Egypt. ...
arXiv:2002.09239v1
fatcat:aq5gd4bciffyhi5igk62vzloqi
Randen - fast backtracking-resistant random generator with AES+Feistel+Reverie
[article]
2018
arXiv
pre-print
Algorithms that rely on a pseudorandom number generator often lose their performance guarantees when adversaries can predict the behavior of the generator. ...
Randen is an instantiation of Reverie, a recently published robust sponge-like random generator, with a new permutation built from an improved generalized Feistel structure with 16 branches. ...
By contrast, NIST 800 90a requires prediction resistance even after the state is compromised [5] . ...
arXiv:1810.02227v1
fatcat:ocbjk47j6re4vgqwdvlo7nl46u
A Systematic Analysis of the Juniper Dual EC Incident
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16
In this paper, we describe the results of a full independent analysis of the ScreenOS randomness and VPN key establishment protocol subsystems, which we carried out in response to this incident. ...
While Dual EC is known to be insecure against an attacker who can choose the elliptic curve parameters, Juniper had claimed in 2013 that ScreenOS included countermeasures against this type of attack. ...
Stevens developed techniques for "counter-cryptanalysis" that he used to reconstruct the MD5 collision attack that the unknown authors of the Flame malware exploited against the Microsoft Terminal Server ...
doi:10.1145/2976749.2978395
dblp:conf/ccs/CheckowayMGFC0H16
fatcat:vgx7xgnjh5bnro5kryr6qbaqi4
An approach of refining RC4 with performance analysis on new variants
2019
Sadhana (Bangalore)
Many years of research on the RC4 stream cipher proves it to be strong enough, but there are claims that its swap function is responsible for essential biases in the output. ...
There are suggestions to discard some initial bytes from the key-stream, to get rid of this, before the actual encryption starts, though no optimum value has been defined. ...
The publication SP 800-90A of NIST [19] contains specifications for cryptographically secured PRNGs (Pseudo-Random Number Generators), providing some methods based on hash functions, block cipher algorithms ...
doi:10.1007/s12046-019-1209-7
fatcat:yiiwam4b4zgenabqy45f7txy7y
COMA: Communication and Obfuscation Management Architecture
[article]
2019
arXiv
pre-print
as a service (for IoT devices), reducing the side channel threats on key management architecture, and providing two new means of secure communication to/from an untrusted chip. ...
Second, it implements a mechanism by which the key sent for unlocking an obfuscated circuit changes after each activation (even for the same device), transforming the key into a dynamically changing license ...
NIST standard SP 800-90B [12] dictates that continuous health testing must be performed on the TRNG. ...
arXiv:1909.00493v1
fatcat:naee66jm4rg6njwn2rgefgap2u
« Previous
Showing results 1 — 15 out of 36 results