首页> 外文会议>IMA conference on cryptography and coding >Recovering Private Keys Generated with Weak PRNGs
【24h】

Recovering Private Keys Generated with Weak PRNGs

机译:恢复由弱PRNG生成的私钥

获取原文

摘要

Suppose that the private key of discrete logarithm-based or factoring-based public-key primitive is obtained by concatenating the outputs of a linear congruential generator. How seriously is the scheme weakened as a result? While linear congruential generators are cryptographically very weak "pseudorandom" number generators, the answer to that question is not immediately obvious, since an adversary in such a setting does not get to examine the outputs of the congruential generator directly, but can only obtain an implicit hint about them-namely the public key. In this paper, we take a closer look at that problem, and show that, in most cases, an attack does exist to retrieve the key much faster than with a naive exhaustive search on the seed of the generator. The problem is similar to the one considered by Bellare, Goldwasser and Micciancio regarding DSA and "pseudorandomness", and this line of work arguably has renewed relevance in view of the sensitive role that random number generation has been found to play in a number of recent noted papers, such as the one by Lenstra et al. at CRYPTO 2012.
机译:假设通过串联线性同余生成器的输出来获得基于离散对数或基于因式的公钥原语的私钥。结果该计划被严重削弱了多少?尽管线性同余生成器在密码学上是非常弱的“伪随机”数生成器,但该问题的答案并非立即显而易见,因为在这种情况下,对手无法直接检查同余生成器的输出,而只能获得隐式生成器的输出。关于它们的提示-即公钥。在本文中,我们仔细研究了该问题,并表明,在大多数情况下,确实存在一种比原始生成器种子进行天真穷举搜索更快地检索密钥的攻击。这个问题类似于Bellare,Goldwasser和Micciancio在DSA和“伪随机性”方面所考虑的问题,并且鉴于最近发现随机数生成在其中起着敏感作用,因此可以说这一工作重新具有相关性。著名的论文,例如Lenstra等人的论文。在CRYPTO 2012上。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号