Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Part 1: General - Computer Security Resource Center - National ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
March, 2007<br />
2. The protocols trigger an alarm after a certain reasonable number of detected error<br />
conditions, and<br />
3. The key dependent computations are obscured from the observer to prevent or minimize<br />
the detection of key dependent characteristics.<br />
4.2.7 Random Number Generation<br />
Random number generators (RNGs) are required for the generation of keying material (e.g., keys<br />
and IVs). Two classes of RNGs are defined: deterministic and non-deterministic. Deterministic<br />
Random bit Generators (DRBGs), sometimes called deterministic random number generators or<br />
pseudorandom number generators, use cryptographic algorithms and the associated keying<br />
material to generate random bits; Non-Deterministic Random Bit Generators (NRBGs),<br />
sometimes called true RNGs, produce output that is dependent on some unpredictable physical<br />
source that is outside human control.<br />
[FIPS186-3] defines a DRBG that may be used to generate random bits for cryptographic<br />
applications (e.g., key or IV generation). The DRBG is initialized with a secret starting value,<br />
called a RNG seed. An “attacker” with knowledge of the DRBG output should not be able to<br />
determine the seed other than by exhaustive guessing.<br />
40