抗随机数后门攻击的密码算法

Translated title of the contribution: Cryptographic Algorithms Against Backdoored Pseudorandom Number Generator
  • Bu Rong Kang
  • , Lei Zhang*
  • , Rui Zhang
  • , Xin Yu Meng
  • , Tong Chen
  • *Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

3 Scopus citations

Abstract

So far, the security of the most of the cryptographic primitives depends on the high-quality and unpredictable randomness. In cryptography, the pseudorandom number generator (PRNG) is used to generate randomness. Thus, the security of the PRNG will directly impact the security of cryptographic algorithms. However, there have been some reports showing that many human factors can lead to the failure randomness generated by the PRNG which is referred to as the backdoored pseudorandom number generator (BPRNG). A good example of this BPRNG is the dual elliptic curves PRNG (Dual EC PRNG) which has been exposed to generate bad randomness. With the emerging of BPRNG, new challenges will be confronted with the study of cryptographic algorithms. Therefore, it is important to investigate the cryptographic primitives against the BPRNG. This study first reviews the research background of the cryptographic primitives against the BPRNG, and then summarizes the existing schemes in this field.

Translated title of the contributionCryptographic Algorithms Against Backdoored Pseudorandom Number Generator
Original languageChinese (Traditional)
Pages (from-to)2887-2900
Number of pages14
JournalRuan Jian Xue Bao/Journal of Software
Volume32
Issue number9
DOIs
StatePublished - Sep 2021

Fingerprint

Dive into the research topics of 'Cryptographic Algorithms Against Backdoored Pseudorandom Number Generator'. Together they form a unique fingerprint.

Cite this