On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function

被引:0
|
作者
Chuah, Chai Wen [1 ]
Deris, Mustafa Mat [1 ]
Dawson, Edward [2 ]
机构
[1] Univ Tun Hussein Onn Malaysia, Parit Raja, Malaysia
[2] Queensland Univ Technol, Brisbane, Qld, Australia
关键词
Key derivation function; Cryptographic key; Hash function; Block cipher; Stream cipher;
D O I
10.1007/978-981-10-4154-9_27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A key derivation function is a function that generate one or more cryptographic keys from a private string together with some public information. The generated cryptographic key(s) must be indistinguishable from random binary strings of the same length. To date, there are designed of key derivation function proposals using cryptographic primitives such as hash functions, block ciphers and stream ciphers. The security of key derivation functions are based on the assumption that the underlying cryptographic primitives are secure from attacks. Unfortunately, the current works do not investigate the consequences for key derivation functions if the cryptographic primitives that are used to build the key derivation functions are broken. In this paper, we are confirmed by results of having the cryptographic primitives that are used to build the key derivation functions are broken, it allows the adversaries to distinguish the cryptographic key from the random binary string of the same length.
引用
收藏
页码:231 / 240
页数:10
相关论文
共 50 条
  • [21] Compressible primitive equations: formal derivation and stability of weak solutions
    Ersoy, Mehmet
    Ngom, Timack
    Sy, Mamadou
    NONLINEARITY, 2011, 24 (01) : 79 - 96
  • [22] A portable hardware security module and cryptographic key generator
    Murtaza, Malik Hamza
    Tahir, Hasan
    Tahir, Shahzaib
    Alizai, Zahoor Ahmed
    Riaz, Qaiser
    Hussain, Mehdi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [23] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [24] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [25] Weak security notions of cryptographic unkeyed hash functions and their amplitiability
    Hirose, S
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 33 - 38
  • [26] Cryptographic protocol security analysis based on bounded constructing algorithm
    LI Xianxian & HUAI Jinpeng School of Computer
    Science in China(Series F:Information Sciences), 2006, (01) : 26 - 47
  • [27] Cryptographic protocol security analysis based on bounded constructing algorithm
    Xianxian Li
    Jinpeng Huai
    Science in China Series F, 2006, 49 : 26 - 47
  • [28] Key derivation algorithms for monotone access structures in cryptographic file systems
    Srivatsa, Mudhakar
    Liu, Ling
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 347 - +
  • [29] Cryptographic protocol security analysis based on bounded constructing algorithm
    Li, XX
    Huai, JP
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2006, 49 (01): : 26 - 47
  • [30] Implementation and characterization of flash-based hardware security primitives for cryptographic key generation
    Oh, Mi-Kyung
    Lee, Sangjae
    Kang, Yousung
    Choi, Dooho
    ETRI JOURNAL, 2023, 45 (02) : 346 - 357