On the Security Analysis of Weak Cryptographic Primitive Based Key Derivation Function

被引:0
|
作者
Chuah, Chai Wen [1 ]
Deris, Mustafa Mat [1 ]
Dawson, Edward [2 ]
机构
[1] Univ Tun Hussein Onn Malaysia, Parit Raja, Malaysia
[2] Queensland Univ Technol, Brisbane, Qld, Australia
关键词
Key derivation function; Cryptographic key; Hash function; Block cipher; Stream cipher;
D O I
10.1007/978-981-10-4154-9_27
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A key derivation function is a function that generate one or more cryptographic keys from a private string together with some public information. The generated cryptographic key(s) must be indistinguishable from random binary strings of the same length. To date, there are designed of key derivation function proposals using cryptographic primitives such as hash functions, block ciphers and stream ciphers. The security of key derivation functions are based on the assumption that the underlying cryptographic primitives are secure from attacks. Unfortunately, the current works do not investigate the consequences for key derivation functions if the cryptographic primitives that are used to build the key derivation functions are broken. In this paper, we are confirmed by results of having the cryptographic primitives that are used to build the key derivation functions are broken, it allows the adversaries to distinguish the cryptographic key from the random binary string of the same length.
引用
收藏
页码:231 / 240
页数:10
相关论文
共 50 条
  • [41] A cryptographic primitive based on hidden-order groups
    Saxena, Amitabh
    Soh, Ben
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2009, 3 (02) : 89 - 132
  • [42] Key Derivation Function: The SCKDF Scheme
    Chuah, Chai Wen
    Dawson, Edward
    Simpson, Leonie
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 125 - 138
  • [43] Key derivation function: key-hash based computational extractor and stream based pseudorandom expander
    Chuah, Chai Wen
    Harun, Nur Ziadah
    Hamid, Isredza Rahmi A.
    PeerJ Computer Science, 2024, 10
  • [44] Efficient and Privacy-Preserving Cryptographic Key Derivation From Continuous Sources
    Rua, Enrique Argones
    Abidin, Aysajan
    Peeters, Roel
    Romme, Jac
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (11) : 2834 - 2847
  • [45] Key derivation function: key-hash based computational extractor and stream based pseudorandom expander
    Chuah, Chai Wen
    Harun, Nur Ziadah
    Hamid, Isredza Rahmi A.
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [46] Deep learning-based biometric cryptographic key generation with post-quantum security
    Kuznetsov, Oleksandr
    Zakharov, Dmytro
    Frontoni, Emanuele
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (19) : 56909 - 56938
  • [47] A Cryptographic Hardware Engineering Course based on FPGA and Security Analysis Equipment
    Lu, Zhaojun
    Chen, Qidong
    Xu, Peng
    Zhang, Jiliang
    Qu, Gang
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 706 - 711
  • [48] Security analysis of three cryptographic schemes from other cryptographic schemes
    Chow, SSM
    Cao, ZJ
    Liu, JK
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 290 - 301
  • [49] On the security of a modified Paillier public-key primitive
    Sakurai, K
    Takagi, T
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 436 - 448
  • [50] On Constructing a Secure and Fast Key Derivation Function Based on Stream Ciphers
    Chuah, Chai Wen
    Alawatugoda, Janaka
    Arbaiy, Nureize
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 1486 - 1493