首页> 外文会议>Annual international cryptology conference >Seedless Fruit Is the Sweetest: Random Number Generation, Revisited
【24h】

Seedless Fruit Is the Sweetest: Random Number Generation, Revisited

机译:无核果是最甜的:再造随机数

获取原文

摘要

The need for high-quality randomness in cryptography makes random-number generation one of its most fundamental tasks. A recent important line of work (initiated by Dodis et al., CCS '13) focuses on the notion of robustness for pseudorandom number generators (PRNGs) with inputs. These are primitives that use various sources to accumulate sufficient entropy into a state, from which pseudorandom bits are extracted. Robustness ensures that PRNGs remain secure even under state compromise and adversarial control of entropy sources. However, the achievability of robustness inherently depends on a seed, or, alternatively, on an ideal primitive (e.g., a random oracle), independent of the source of entropy. Both assumptions are problematic: seed generation requires randomness to start with, and it is arguable whether the seed or the ideal primitive can be kept independent of the source. This paper resolves this dilemma by putting forward new notions of robustness which enable both (1) seedless PRNGs and (2) primitive-dependent adversarial sources of entropy. To bypass obvious impossibility results, we make a realistic compromise by requiring that the source produce sufficient entropy even given its evaluations of the underlying primitive. We also provide natural, practical, and provably secure constructions based on hash-function designs from compression functions, block ciphers, and permutations. Our constructions can be instantiated with minimal changes to industry-standard hash functions SHA-2 and SHA-3, or key derivation function HKDF, and can be downgraded to (online) seedless randomness extractors, which are of independent interest. On the way we consider both a computational variant of robustness, where attackers only make a bounded number of queries to the ideal primitive, as well as a new information-theoretic variant, which dispenses with this assumption to a certain extent, at the price of requiring a high rate of injected weak randomness (as it is, e.g., plausible on Intel's on-chip RNG). The latter notion enables applications such as everlasting security. Finally, we show that the CBC extractor, used by Intel's on-chip RNG, is provably insecure in our model.
机译:加密中对高质量随机性的需求使随机数生成成为其最基本的任务之一。最近的一项重要工作(由Dodis等人发起,CCS '13)关注带有输入的伪随机数生成器(PRNG)的鲁棒性概念。这些是使用各种源将足够的熵累积到某种状态的原语,从中提取伪随机位。鲁棒性可确保PRNG即使在状态破坏和熵源的对抗控制下也能保持安全。但是,鲁棒性的可取性固有地取决于种子,或者取决于理想的原语(例如,随机预言),而与熵的来源无关。这两个假设都是有问题的:种子的生成需要随机性开始,并且是否可以将种子或理想原语保持独立于来源是有争议的。本文通过提出鲁棒性的新概念解决了这一难题,该概念使(1)无核PRNG和(2)依赖于熵的原始依赖型对抗性源都成为可能。为了绕过明显的不可能结果,我们要求源即使在对基础图元进行了评估的情况下也必须产生足够的熵,从而做出了现实的妥协。我们还基于来自压缩函数,分组密码和置换的哈希函数设计,提供了自然,实用且可证明可靠的安全构造。我们的构造可以通过对行业标准哈希函数SHA-2和SHA-3或密钥派生函数HKDF进行最小更改来实例化,并且可以降级为(在线)无种子随机性提取器,这些提取器具有独立的利益。在此过程中,我们既考虑了健壮性的计算变体(攻击者仅对理想原语进行了有限数量的查询),还考虑了新的信息理论变体,该变体在一定程度上免除了此假设,但代价是需要较高的弱弱随机注入率(例如,在英特尔片上RNG上似乎是合理的)。后一个概念可实现诸如持久安全性之类的应用程序。最后,我们证明了英特尔片上RNG使用的CBC提取器在我们的模型中证明是不安全的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号