31.07.2013 Views

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

Part 1: General - Computer Security Resource Center - National ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

March, 2007<br />

2. The protocols trigger an alarm after a certain reasonable number of detected error<br />

conditions, and<br />

3. The key dependent computations are obscured from the observer to prevent or minimize<br />

the detection of key dependent characteristics.<br />

4.2.7 Random Number Generation<br />

Random number generators (RNGs) are required for the generation of keying material (e.g., keys<br />

and IVs). Two classes of RNGs are defined: deterministic and non-deterministic. Deterministic<br />

Random bit Generators (DRBGs), sometimes called deterministic random number generators or<br />

pseudorandom number generators, use cryptographic algorithms and the associated keying<br />

material to generate random bits; Non-Deterministic Random Bit Generators (NRBGs),<br />

sometimes called true RNGs, produce output that is dependent on some unpredictable physical<br />

source that is outside human control.<br />

[FIPS186-3] defines a DRBG that may be used to generate random bits for cryptographic<br />

applications (e.g., key or IV generation). The DRBG is initialized with a secret starting value,<br />

called a RNG seed. An “attacker” with knowledge of the DRBG output should not be able to<br />

determine the seed other than by exhaustive guessing.<br />

40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!