On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function

被引:0
|
作者
Chuah, Chai Wen [1 ]
Deris, Mustafa Mat [1 ]
Dawson, Edward [2 ]
机构
[1] Univ Tun Hussein Onn Malaysia, Parit Raja, Malaysia
[2] Queensland Univ Technol, Brisbane, Qld, Australia
关键词
Key derivation function; Cryptographic key; Hash function; Block cipher; Stream cipher;
D O I
10.1007/978-981-10-4154-9_27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A key derivation function is a function that generate one or more cryptographic keys from a private string together with some public information. The generated cryptographic key(s) must be indistinguishable from random binary strings of the same length. To date, there are designed of key derivation function proposals using cryptographic primitives such as hash functions, block ciphers and stream ciphers. The security of key derivation functions are based on the assumption that the underlying cryptographic primitives are secure from attacks. Unfortunately, the current works do not investigate the consequences for key derivation functions if the cryptographic primitives that are used to build the key derivation functions are broken. In this paper, we are confirmed by results of having the cryptographic primitives that are used to build the key derivation functions are broken, it allows the adversaries to distinguish the cryptographic key from the random binary string of the same length.
引用
收藏
页码:231 / 240
页数:10
相关论文
共 50 条
  • [1] On optimal cryptographic key derivation
    Chan, Aldar C. -F.
    THEORETICAL COMPUTER SCIENCE, 2013, 489 : 21 - 36
  • [2] Security Analysis of the MLS Key Derivation
    Brzuska, Chris
    Cornelissen, Eric
    Kohbrok, Konrad
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 2535 - 2553
  • [3] Cryptographic Extraction and Key Derivation: The HKDF Scheme
    Krawczyk, Hugo
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 631 - 648
  • [4] Security of weak secrets based cryptographic primitives via the Renyi entropy
    Yao, Yanqing
    Li, Zhoujun
    IET INFORMATION SECURITY, 2016, 10 (06) : 442 - 450
  • [5] A new cryptographic primitive for noise tolerant template security
    Karabina, Koray
    Canpolat, Onur
    PATTERN RECOGNITION LETTERS, 2016, 80 : 70 - 75
  • [6] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION
    Nema, Preksha
    Rizvi, M. A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
  • [7] On the security of key derivation functions
    Adams, C
    Kramer, G
    Mister, S
    Zuccherato, R
    INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 134 - 145
  • [8] Q-CSKDF: A Continuous and Security Key Derivation Function for Quantum Key Distribution
    Chen, Lutong
    Xue, Kaiping
    Li, Jian
    Li, Zhonghui
    Yu, Nenghai
    IEEE NETWORK, 2024, 38 (05): : 123 - 130
  • [9] A SECURITY ANALYSIS OF PUBLIC KEY CRYPTOGRAPHIC SYSTEMS USED FOR ELECTRONIC SIGNATURE
    Neacsu, Eugen
    Schiopu, Paul
    UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2021, 83 (01): : 135 - 146
  • [10] A security analysis of public key cryptographic systems used for electronic signature
    Neacșu, Eugen
    Șchiopu, Paul
    UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2021, 83 (01): : 135 - 146