ISO IEC 18031-2011 Information technology - Security techniques - Random bit generation《信息技术 安全性工艺 二进制位的随机生成》.pdf
《ISO IEC 18031-2011 Information technology - Security techniques - Random bit generation《信息技术 安全性工艺 二进制位的随机生成》.pdf》由会员分享,可在线阅读,更多相关《ISO IEC 18031-2011 Information technology - Security techniques - Random bit generation《信息技术 安全性工艺 二进制位的随机生成》.pdf(152页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference number ISO/IEC 18031:2011(E) ISO/IEC 2011INTERNATIONAL STANDARD ISO/IEC 18031 Second edition 2011-11-15 Information technology Security techniques Random bit generation Technologies de linformation Techniques de scurit Gnration de bits alatoires ISO/IEC 18031:2011(E) COPYRIGHT PROTECTED D
2、OCUMENT ISO/IEC 2011 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs memb
3、er body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in Switzerland ii ISO/IEC 2011 All rights reservedISO/IEC 18031:2011(E) ISO/IEC 2011 All rights reserved iiiC
4、ontents Page Foreword vi Introduction . vii 1 Scope 1 2 Normative references 1 3 Terms and definitions . 2 4 Symbols 5 5 Properties and requirements of an RBG . 6 5.1 Properties of an RBG 6 5.2 Requirements of an RBG 7 5.3 Optional requirements for an RBG 8 6 RBG model . 8 6.1 Conceptual functional
5、model for random bit generation 8 6.2 RBG basic components 9 6.2.1 Introduction to the RBG basic components . 9 6.2.2 Entropy source 10 6.2.3 Additional inputs . 10 6.2.4 Internal state 11 6.2.5 Internal state transition functions . 12 6.2.6 Output generation function 13 6.2.7 Support functions 13 7
6、 Types of RBGs . 14 7.1 Introduction to the types of RBGs . 14 7.2 Non-deterministic random bit generators . 14 7.3 Deterministic random bit generators 15 7.4 The RBG spectrum 15 8 Overview and requirements for an NRBG . 16 8.1 NRBG overview 16 8.2 Functional model of an NRBG . 16 8.3 NRBG entropy s
7、ources . 18 8.3.1 Primary entropy source for an NRBG . 18 8.3.2 Physical entropy sources for an NRBG 20 8.3.3 NRBG non-physical entropy sources 20 8.3.4 NRBG additional entropy sources . 21 8.3.5 Hybrid NRBGs 22 8.4 NRBG additional inputs 22 8.4.1 NRBG additional inputs overview 22 8.4.2 Requirement
8、s for NRBG additional inputs . 22 8.5 NRBG internal state . 23 8.5.1 NRBG internal state overview 23 8.5.2 Requirements for the NRBG internal state . 23 8.5.3 Optional requirements for the NRBG internal state . 24 8.6 NRBG internal state transition functions 24 8.6.1 NRBG internal state transition f
9、unctions overview . 24 8.6.2 Requirements for the NRBG internal state transition functions 25 8.6.3 Optional requirements for the NRBG internal state transition functions 25 8.7 NRBG output generation function . 26 8.7.1 NRBG output generation function overview. 26 8.7.2 Requirements for the NRBG ou
10、tput generation function 26 ISO/IEC 18031:2011(E) iv ISO/IEC 2011 All rights reserved8.7.3 An optional requirement for the NRBG output generation function 26 8.8 NRBG health tests .26 8.8.1 NRBG health tests overview .26 8.8.2 General NRBG health test requirements .27 8.8.3 NRBG health test on deter
11、ministic components 27 8.8.4 NRBG health tests on entropy sources .28 8.8.5 NRBG health tests on random output .29 8.9 NRBG component interaction 31 8.9.1 NRBG component interaction overview 31 8.9.2 Requirements for NRBG component interaction .31 8.9.3 Optional requirements for NRBG component inter
12、action .31 9 Overview and requirements for a DRBG .31 9.1 DRBG overview 31 9.2 Functional model of a DRBG 32 9.3 DRBG entropy source .34 9.3.1 Primary entropy source for a DRBG 34 9.3.2 Generating seed values for a DRBG 36 9.3.3 Additional entropy sources for a DRBG 36 9.3.4 Hybrid DRBG 37 9.4 Addit
13、ional inputs for a DRBG .37 9.5 Internal state for a DRBG 37 9.6 Internal state transition function for a DRBG .38 9.7 Output generation function for a DRBG 39 9.8 Support functions for a DRBG .39 9.8.1 DRBG support functions overview 39 9.8.2 DRBG health test .39 9.8.3 DRBG deterministic algorithm
14、test 40 9.8.4 DRBG software/firmware integrity test 40 9.8.5 DRBG critical functions test .40 9.8.6 DRBG software/firmware load test .40 9.8.7 DRBG manual key entry test 40 9.8.8 DRBG continuous random bit generator test .40 9.9 Additional requirements for DRBG keys .41 Annex A (normative) Combining
15、 RBGs 43 Annex B (normative) Conversion methods 44 B.1 Random number generation .44 B.1.1 Techniques for generating random numbers .44 B.1.2 The simple discard method 44 B.1.3 The complex discard method .44 B.1.4 The simple modular method .45 B.1.5 The complex modular method 45 B.2 Extracting bits i
16、n the Dual_EC_DRBG .46 B.2.1 Potential bias in an elliptic curve over a prime field F p.46 B.2.2 Adjusting for the missing bit(s) of entropy in the x coordinates 47 B.2.3 Values for E 48 B.2.4 Observations 50 Annex C (normative) DRBGs .51 C.1 DRBG mechanism examples 51 C.2 DRBGs based on hash-functi
17、ons .51 C.2.1 Introduction to DRBGs based on hash-functions 51 C.2.2 Hash_DRBG 51 C.2.3 HMAC_DRBG 59 C.3 DRBGs based on block ciphers .65 C.3.1 Introduction to DRBGs based on block ciphers .65 C.3.2 CTR_DRBG .65 C.3.3 OFB_DRBG .74 C.4 DRBGs based on number theoretic problems 76 C.4.1 Introduction to
18、 DRBGs based on number theoretic problems .76 ISO/IEC 18031:2011(E) ISO/IEC 2011 All rights reserved vC.4.2 Dual Elliptic Curve DRBG (Dual_EC_DRBG) 76 C.4.3 Micali Schnorr DRBG (MS_DRBG) . 85 C.5 DRBG based on multivariate quadratic equations 95 C.5.1 Introduction to a DRBG based on multivariate qua
19、dratic equations . 95 C.5.2 Multivariate Quadratic DRBG (MQ_DRBG) . 95 Annex D (normative) Application specific constants . 107 D.1 Constants for the Dual_EC_DRBG 107 D.1.1 Introduction to Dual_EC_DRBG required constants . 107 D.1.2 Curves over prime fields. 107 D.1.3 Curves over binary fields . 110
20、 D.2 Default moduli for the MS_DRBG () . 120 D.2.1 Introduction to MS_DRBG default moduli 120 D.2.2 Default modulus n of size 1024 bits 120 D.2.3 Default modulus n of size 2048 bits 120 D.2.4 Default modulus n of size 3072 bits 120 D.2.5 Default modulus n of size 7680 bits 120 D.2.6 Default modulus
21、n of size 15360 bits 121 Annex E (informative) NRBG examples 123 E.1 Canonical coin tossing example 123 E.1.1 Overview . 123 E.1.2 Description of basic process . 123 E.1.3 Relation to standard NRBG components 123 E.1.4 Optional variations 124 E.1.5 Peres unbiasing procedure 124 E.2 Hypothetical nois
22、y diode example 125 E.2.1 Overview . 125 E.2.2 General structure . 125 E.2.3 Details of operation . 126 E.2.4 Failsafe design consequences 130 E.2.5 Modified example 130 E.3 Mouse movement example . 130 Annex F (informative) Security considerations . 132 F.1 Attack model 132 F.2 The security of hash
23、-functions 132 F.3 Algorithm and key size selection . 132 F.3.1 Introduction 132 F.3.2 Equivalent algorithm strengths . 133 F.3.3 Selection of appropriate DRBGs 134 F.4 The security of block cipher DRBGs . 135 F.5 Conditioned entropy sources and the derivation function . 135 Annex G (informative) Di
24、scussion on the estimation of entropy . 136 Annex H (informative) RBG assurance . 137 Annex I (informative) RBG boundaries . 138 Annex J (informative) Rationale for the design of statistical tests 140 J.1 Introduction 140 J.2 Runs test 140 J.3 Long runs test 140 Bibliography 142 ISO/IEC 18031:2011(E
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIEC180312011INFORMATIONTECHNOLOGYSECURITYTECHNIQUESRANDOMBITGENERATION 信息技术 安全性 工艺 二进制位 随机 生成 PDF

链接地址:http://www.mydoc123.com/p-1256980.html