Secure Applications of Low-Entropy Keys
نویسندگان
چکیده
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s+ t-bit keyspace is the same as the time required to brute-force search a s-bit key stretched by t bits.
منابع مشابه
Lower Bounds on Key Derivation for Square-Friendly Applications
Security of cryptographic applications is typically defined by security games. The adversary, within certain resources, cannot win with probability much better than 0 (for unpredictability applications, like one-way functions) or much better than 2 (indistinguishability applications for instance encryption schemes). In so called squared-friendly applications the winning probability of the adver...
متن کاملKey Derivation for Squared-Friendly Applications: Lower Bounds
Security of a cryptographic application is typically defined by a security game. The adversary, within certain resources, cannot win with probability much better than 0 (for unpredictability applications, like one-way functions) or much better than 2 (indistinguishability applications for instance encryption schemes). In so called squared-friendly applications the winning probability of the adv...
متن کاملÉcole normale supérieure LIENS – École Doctorale de Sciences Mathématiques de Paris Centre Reducing The Need For Trusted Parties In Cryptography
Trusted parties are fundamental for the establishment of secure communication among users. Such is the case, for example, when establishing a trusted relationship between users and certain public information in a public-key infrastructure for public-key encryption and signature schemes or when storing high-entropy secret keys in a cryptographic device. Clearly, if the trusted party misbehaves i...
متن کاملUltra Low Power Symmetric Pass Gate Adiabatic Logic with CNTFET for Secure IoT Applications
With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...
متن کاملThe entropy of keys derived from laser speckle
Laser speckle has been proposed in a number of papers as a high-entropy source of unpredictable bits for use in security applications. Bit strings derived from speckle can be used for a variety of security purposes such as identification, authentication, anti-counterfeiting, secure key storage, random number generation and tamper protection. The choice of laser speckle as a source of random key...
متن کامل