A TPRF-based pseudo-random number generator

Elena Andreeva, Andreas Weninger
{"title":"A TPRF-based pseudo-random number generator","authors":"Elena Andreeva, Andreas Weninger","doi":"10.20517/jsss.2023.45","DOIUrl":null,"url":null,"abstract":"Most cryptographic applications use randomness that is generated by pseudo-random number generators (PRNGs). A popular PRNG practical choice is the NIST standardized $$ \\rm{CTR\\_DRBG}$$ . In their recent ACNS 2023 publication, Andreeva and Weninger proposed a new and more efficient and secure PRNG called $$ \\mathtt{FCRNG}$$ . $$ \\mathtt{FCRNG}$$ is based on $$ \\rm{CTR\\_DRBG}$$ and uses the $$ n $$ -to-$$ 2n $$ forkcipher expanding primitive ForkSkinny as a building block. In this work, we create a new BKRNG PRNG, which is based on $$ \\mathtt{FCRNG}$$ and employs the novel $$ n $$ -to-$$ 8n $$ expanding primitive Butterknife. Butterknife is based on the Deoxys tweakable blockcipher (and thus AES) and realizes a tweakable expanding pseudo-random function. While both blockciphers and forkciphers are invertible primitives, tweakable expanding pseudo-random functions are not. This functional simplification enables security benefits for BKRNG in the robustness security game - the standard security goal for a PRNG. Contrary to the security bound of $$ \\rm{CTR\\_DRBG}$$ , we show that the security of our BKRNG construction does not degrade with the length of the random inputs, nor the number of requested output pseudo-random bits. We also empirically verify the BKRNG security with the NIST PRNG test suite and the TestU01 suite.\n Furthermore, we show the $$ n $$ -to-$$ 8n $$ multi-branch expanding nature of Butterknife contributes to a significant speed-up in the efficiency of BKRNG compared to $$ \\mathtt{FCRNG}$$ . More concretely, producing random bits with BKRNG is 30.0% faster than $$ \\mathtt{FCRNG}$$ and 49.2% faster than $$ \\rm{CTR\\_DRBG}$$ .","PeriodicalId":509397,"journal":{"name":"Journal of Surveillance, Security and Safety","volume":"31 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Surveillance, Security and Safety","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20517/jsss.2023.45","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Most cryptographic applications use randomness that is generated by pseudo-random number generators (PRNGs). A popular PRNG practical choice is the NIST standardized $$ \rm{CTR\_DRBG}$$ . In their recent ACNS 2023 publication, Andreeva and Weninger proposed a new and more efficient and secure PRNG called $$ \mathtt{FCRNG}$$ . $$ \mathtt{FCRNG}$$ is based on $$ \rm{CTR\_DRBG}$$ and uses the $$ n $$ -to-$$ 2n $$ forkcipher expanding primitive ForkSkinny as a building block. In this work, we create a new BKRNG PRNG, which is based on $$ \mathtt{FCRNG}$$ and employs the novel $$ n $$ -to-$$ 8n $$ expanding primitive Butterknife. Butterknife is based on the Deoxys tweakable blockcipher (and thus AES) and realizes a tweakable expanding pseudo-random function. While both blockciphers and forkciphers are invertible primitives, tweakable expanding pseudo-random functions are not. This functional simplification enables security benefits for BKRNG in the robustness security game - the standard security goal for a PRNG. Contrary to the security bound of $$ \rm{CTR\_DRBG}$$ , we show that the security of our BKRNG construction does not degrade with the length of the random inputs, nor the number of requested output pseudo-random bits. We also empirically verify the BKRNG security with the NIST PRNG test suite and the TestU01 suite. Furthermore, we show the $$ n $$ -to-$$ 8n $$ multi-branch expanding nature of Butterknife contributes to a significant speed-up in the efficiency of BKRNG compared to $$ \mathtt{FCRNG}$$ . More concretely, producing random bits with BKRNG is 30.0% faster than $$ \mathtt{FCRNG}$$ and 49.2% faster than $$ \rm{CTR\_DRBG}$$ .
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于 TPRF 的伪随机数生成器
大多数加密应用都使用由伪随机数发生器(PRNG)生成的随机性。在最近发表的 ACNS 2023 中,Andreeva 和 Weninger 提出了一种名为 $$ \mathtt{FCRNG}$ 的更高效、更安全的新型 PRNG。\mathtt{FCRNG}$$ 基于 \rm{CTR\_DRBG}$$ 并使用 $$ n $ -to $$ 2n $ forkcipher 扩展基元 ForkSkinny 作为构建模块。在这项工作中,我们创建了一种新的 BKRNG PRNG,它基于 $$ \mathtt{FCRNG}$$,并采用了新颖的 $$ n $ -to-$$ 8n $ 扩展基元 Butterknife。Butterknife 基于 Deoxys 可调整块密码(以及 AES),实现了可调整扩展伪随机函数。虽然分块密码器和叉密码器都是可逆基元,但可调整扩展伪随机函数却不是。这种功能简化使 BKRNG 在鲁棒性安全博弈中获得了安全优势--鲁棒性安全博弈是 PRNG 的标准安全目标。与 $$ \rm{CTR\_DRBG}$ 的安全边界相反,我们证明了我们的 BKRNG 结构的安全性不会随着随机输入的长度或所要求的输出伪随机比特的数量而降低。我们还通过 NIST PRNG 测试套件和 TestU01 套件验证了 BKRNG 的安全性。此外,我们还展示了 Butterknife 的 $$ n $ -to$ 8n $ 多分支扩展特性,与 $$ \mathtt{FCRNG}$ 相比,BKRNG 的效率显著提高。更具体地说,使用 BKRNG 生成随机比特的速度比 $$ \mathtt{FCRNG}$ 快 30.0%,比 $$ \rm{CTR\_DRBG}$ 快 49.2%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
TENNER: intrusion detection models for industrial networks based on ensemble learning Improved differential fault analysis of Grain128-AEAD A survey on wireless-communication vulnerabilities of ERTMS in the railway sector A TPRF-based pseudo-random number generator Bias and fairness in software and automation tools in digital forensics
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1