- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Cryptography and Network SecurityChapter 12.ppt
The essential elements of any pseudorandom number generator (PRNG) are a seed value and a deterministic algorithm for generating a stream of pseudorandom bits. If the algorithm is used as a pseudorandom function (PRF) to produce a required value, such as a session key, then the seed should only be known to the user of the PRF. If the algorithm is used to produce a stream encryption function, then the seed has the role of a secret key that must be known to the sender and the receiver. We noted in Chapters 7 and 10 that, because an encryption algorithm produces an apparently random output, it can serve as the basis of a (PRNG). Similarly, an hash function or MAC produces apparently random output and can be used to build a PRNG. Both ISO standard 18031 (Random Bit Generation) and NIST SP 800-90 (Recommendation for Random Number Generation Using Deterministic Random Bit Generators) define an approach for random number generation using a cryptographic hash function. SP 800-90 also defines a random number generator based on HMAC. We look at these two approaches in turn. * Stallings Figure 12.12a shows the basic strategy for a hash-based PRNG specified in SP 800-90 and ISO 18031. The algorithm takes as input: V = seed; seedlen = bit length of V = k + 64, where k is a desired security level expressed in bits; n = desired number of output bits. The algorithm uses the cryptographic hash function H with an hash value output of outlen bits. The basic operation of the algorithm is: m = ceil(n/outlen) data = V W = the null string for i = 1 to m wi = H(data) W = W || wi data = (data + 1) mod 2seedlen return leftmost n bits of W Thus, the pseudorandom bit stream is w 1 || w2 || … || wm, with the final block truncated if required. The SP 800-90 specification also provides for periodically updating V to enhance security. The specification also indicates that there are no known or suspected weaknesses in the hash- based appr
您可能关注的文档
- 98-2职场趋势与职场伦理.ppt
- A Fast Deterministic Parser for Chinese.ppt
- Address Till June 21, 2002 9042 SW 97th Ave. #3 Miami .ppt
- AIDSBASIC THEMES DURING EPIDEMICSJonathon Erlen.ppt
- AN INTRODUCTION TO PLOTS, ISSUES AND THEMES.ppt
- Analog Pulse Amplitude Modulation.ppt
- Analysis of Hong Kong Stock Market(Group 6).ppt
- Appendix ACase Study ReportFebruary 12, 2007.ppt
- ASTR 2310 Chapter 12.ppt
- ASYMMETRIC INFORMATION.ppt
- CSCC 12 Days of Christmas.ppt
- CSE115ENGR160 Discrete Mathematics042612.ppt
- CSE115ENGR160 Discrete Mathematics050112.ppt
- Current Seafood Quality and Safety Concerns.ppt
- CYTOKINES AND RECEPTORSChapter 12.ppt
- D7_6空间曲线.ppt-第七章.ppt
- Dalian, Your Ideal Destination For IT Outsourcing.ppt
- Data Structures(数据结构)Course 12Graphs.ppt
- Data Structures(数据结构)Course 2Searching.ppt
- DBMS分类矩阵.ppt
文档评论(0)