350 rub
Journal Highly available systems №3 for 2013 г.
Article in number:
Block cipher- and hash-based deterministic random number generators: principles of synthesis and methods of analysis
Authors:
G.B. Marshalko - expert
Abstract:
We also review classical approaches for cryptanalysis of such generators. Through analysis of known publications and several standards of NIST, ISO and BSI we specify general principles for block cipher- and hash-based deterministic random number generators.
Pages: 19-23
References

  1. ANSI X 9.17 (Revised) American National Standard for Financial Institution Key Management (Wholesale), American Bankers Association, 1985. 2001.
  2. FIPS PUB 186 Digital Signature Standard. NIST. 1994. 2001.
  3. NIST SP 800-90A. Recommendation for random number generation using deterministic random bit generators. January 2012.
  4. ISO/IEC 18031. Information technology. Security techniques. Random bit generation. 2012.
  5. AIS 20. Functionality classes and evaluation methodology for deterministic random number generators. 1999.
  6. AIS 20. A proposal for: Functionality classes and evaluation methodology for deterministic random number generators. 2011
  7. Abdalla M., Bellare M. Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. In Proc. ASIACRYPT 2000, 546-559.
  8. Bellare M., Rogaway P. Introduction to Modern Cryptography, 2002.
  9. Campagna M. Security bounds for the NIST codebook-based deterministic random bit generator. URL: http://eprint.iacr.org.
  10. Kelsey J., Schneier B., Wagner D., Hall C. Cryptanalytic Attacks on Pseudorandom Number Generators. In Proc. FSE-98. P. 168-188.
  11. Lacy J.B., Mitchell D.P., Schell W.M. CryptoLib: Cryptography in software, In. Proc. USENIX Security Symposium IV. 1993. P. 237-246.