Gary Granger, AT&E Technical Director, Leidos
Random values are required for applications using cryptography (such as for crypto keys, nonces, etc)
There are two basic strategies for generating random bits - non deterministic random bit generator (NDRBG) and deterministic random bit generator (DRBG) . Both strategies depend on unpredictability.
Entropy source is covered in NIST SP 800-90B (design and testing requirements). Entropy source model: Noise source, conditioning component, and health tests.
How do we measure entropy? A noise source sample represents a discrete random variable. There are several measures of entropy based on a random variable's probability distribution line Shannon Entropy or Min-Entropy. NIST SP 800-90B specifies requirements using min-entropy (conservative estimate that facilitates entropy estimation).
FIPS has additional implications for RNG in their implementation guidance, specifically IG 7.11. It defines non-deterministic random number generators (NDRNG), identifies FIPS 140 requirements for tests, etc.
IG 7.13 covers cryptographic key strength modified by an entropy estimate For example, the entropy has to have at least 112 bits of security strength or the associated algorithm and key shall not be used in the approved mode of operation.
But the basic problem - entropy standards and test methods do not yet exist. How can a vendor determine and document estimate of their entropy? How do we back up our claims?
There are also different concerns to consider if you are using an internal (to your boundary) source of entropy or an external (to your boundary) source for entropy.
When They Go High, You Go Logo
-
I love a good hand-piped logo wreck. It says, "YAY TEAM!" without all that
pretentious "artistry" and/or "talent."
For instance, bakers, you *know* that ...
No comments:
Post a Comment