Security of biased sources for cryptographic keys

被引:0
|
作者
Mihailescu, P [1 ]
机构
[1] ETH Zurich, Inst Wissensch Rechnen, CH-8090 Zurich, Switzerland
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptographic schemes are based on keys that are highly involved in granting their security. It is in general assumed that the source producing these keys has uniform distribution, that is, it produces keys from a given key space with equal probability. Consequently, deviations from uniform distribution of the key source may be regarded a priori as a potential security breach, even if no dedicated attack is known, which might take advantage of these deviations. We propose in this paper a model for biased key sources and show that it is possible to prove some results about tolerance of biases, that have the property of being inherent to the bias itself and not requiring assumptions about unknown attacks, using these biases. The model is based on comparing the average case complexities of generic attacks to some number theoretical problems, with respect to uniform and to biased distributions. We also show the connection to information entropy based analysis of biased sources, which was used in earlier works, for suggesting the tolerance of biased sources.
引用
收藏
页码:287 / 302
页数:16
相关论文
共 50 条
  • [1] Direct visualization of cryptographic keys for enhanced security
    Lobachev, Oleg
    [J]. VISUAL COMPUTER, 2018, 34 (12): : 1749 - 1759
  • [2] Direct visualization of cryptographic keys for enhanced security
    Oleg Lobachev
    [J]. The Visual Computer, 2018, 34 : 1749 - 1759
  • [3] A limitation on security evaluation of cryptographic primitives with fixed keys
    Kawai, Yutaka
    Hanaoka, Goichiro
    Ohta, Kazuo
    Kunihiro, Noboru
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1663 - 1675
  • [4] Security Keys: Practical Cryptographic Second Factors for the Modern Web
    Lang, Juan
    Czeskis, Alexei
    Balfanz, Dirk
    Schilder, Marius
    Srinivas, Sampath
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 422 - 440
  • [5] A biometric-based scheme for enhancing security of cryptographic keys
    Siyal, MY
    Ahmed, F
    [J]. TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B407 - B410
  • [6] CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud Systems
    Bracciale, Lorenzo
    Loreti, Pierpaolo
    Raso, Emanuele
    Naldi, Maurizio
    Bianchi, Giuseppe
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 361 - 368
  • [7] On Compression of Cryptographic Keys
    Chan, Aldar C-F.
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 1853 - 1857
  • [8] Keeping cryptographic keys safe
    Gregory S. Kanter
    Prem Kumar
    [J]. Nature Photonics, 2007, 1 : 15 - 16
  • [9] Keeping cryptographic keys safe
    Kanter, Gregory S.
    Kumar, Prem
    [J]. NATURE PHOTONICS, 2007, 1 (01) : 15 - 16
  • [10] Intelligent Management of the Cryptographic Keys
    Moise, G.
    Cangea, O.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (01) : 150 - 157