2020
DOI: 10.1007/978-3-030-56784-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of NIST CTR-DRBG

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
16
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(18 citation statements)
references
References 25 publications
1
16
0
1
Order By: Relevance
“…β€’ We provide full security proof for BKRNG in the robustness security game by Dodis et al [2] . The proof bears similarity to the proofs for FCRNG [5] and CTR_DRBG [4] . Similar to the previous PRNG security proofs, we treat the internal TPRF primitive as ideal, which means that we consider it to be randomly drawn from all possible TPRFs with the same input, output, and tweakey size.…”
Section: Contributionssupporting
confidence: 52%
See 3 more Smart Citations
“…β€’ We provide full security proof for BKRNG in the robustness security game by Dodis et al [2] . The proof bears similarity to the proofs for FCRNG [5] and CTR_DRBG [4] . Similar to the previous PRNG security proofs, we treat the internal TPRF primitive as ideal, which means that we consider it to be randomly drawn from all possible TPRFs with the same input, output, and tweakey size.…”
Section: Contributionssupporting
confidence: 52%
“…Following [4,12] , we consider the interactions of a distinguisher A with an abstract system 𝑆 that answers A's queries. The resulting interaction then generates a transcript 𝜏 = ((𝑋 1 , π‘Œ 1 ), ..., (𝑋 π‘ž , π‘Œ π‘ž )) of query-answer pairs.…”
Section: Systems Transcripts and The H-coefficient Proof Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…The performance of the 𝐴𝐸𝑆_𝐢𝑇𝑅 algorithm was tested in [47] to ensure that it is suitable as the internal state algorithm in DRBG block encryption. However, some researchers found security vulnerability in the 𝐢𝑇𝑅_𝐷𝑅𝐡𝐺, as discussed in [48][49][50]. A practical attack occurred in 𝐢𝑇𝑅_𝐴𝐸𝑆 𝐷𝑅𝐡𝐺 128, and the attacker could obtain the input of the internal state that was being used.…”
Section: A Ctr_aes Drbg 128mentioning
confidence: 99%