|
|
Subscribe / Log in / New account

A new Dual EC DRBG flaw

A new Dual EC DRBG flaw

Posted Jan 2, 2014 4:15 UTC (Thu) by eternaleye (guest, #67051)
In reply to: A new Dual EC DRBG flaw by freemars
Parent article: A new Dual EC DRBG flaw

Not at all. DRBG is the NIST terminology for a _pseudo_random number generator - which expands a small seed into a longer stream of unpredictable data.

DRBGs/PRNGs are used either when a) you don't have a hardware source of true randomness (generally either thermal, quantum, or radiological) b.) that hardware source generates randomness slower than you need (and so you want to expand it using something relatively fast) or c.) you want to pool randomness from multiple sources in a way that reduces the risks if one or more is compromised.

Linux's /dev/random and /dev/urandom are PRNGs that are seeded by hardware entropy sources; the BSDs generally use one based on the Yarrow construction from Schneier - both instances of c).

Stream ciphers are (essentially) PRNGs that you then XOR with your plaintext, a use case that _requires_ the same seed generate the same output (deterministic).


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds