• DocumentCode
    119736
  • Title

    Insertion attack effects on some PRNGs based on NIST randomness tests tool: Case study on ANSI-X9.17, ANSIX9.31, Dragon and Rabbit algorithms

  • Author

    Indarjani, Santi ; Nugraha, Adi ; Supriyatno, Gigih ; Astawa, I. Made Mustika

  • Author_Institution
    Nat. Crypto Inst., Univ. of Indonesia, Bogor, Indonesia
  • fYear
    2014
  • fDate
    21-23 Oct. 2014
  • Firstpage
    181
  • Lastpage
    186
  • Abstract
    Based on previous research [1], the 1-bit insertion attack with random bits on AES-based PRNG had some effects on randomness property of the output sequences after the attack, where about 8 from total 45 experiments (17.17%) had failed test at most 3 tests on AES-128, 11 experiments from 45 (24.44%) on AES-192 mostly had one failed test where only one experiment has two failed tests, and on AES 256 we got 10 experiments from 45 (22.22%) had failed test at most 3 tests, where 8 of them just have one test. So globally the 1-bit insertion attack with random bits affected the randomness property of AES-based PRNG even not significant based on NIST randomness tests under α =0.01. In this research, we also expand the case study on the other 4 algorithms ANSI X9.17, X9.31, Dragon and Rabbit Stream Cipher. The scenario still the same with level of significant α = 0.01. From the experiments, we found that the insertion attack with random bits on the four algorithms has affected the randomness property of the output sequences after the attack indicated by at least 2 experiments from 30 experiments on each algorithms has failed tests at most 2 tests on average on each experiment. The effects are increasing for higher intensity level. Among the 4 algorithms, the Dragon-based algorithm is stronger against the three other algorithms indicated by only 2 failed tests occurred in two different experiments. It is also shown that the insertion attack effect with extreme bits is very significant which may danger the randomness of the target PRNG that should be anticipated.
  • Keywords
    cryptography; random number generation; AES 256; AES-128; AES-192; AES-based PRNG; ANSI-X9.17; ANSIX9.31; Dragon algorithms; Dragon stream cipher; NIST randomness tests tool; Rabbit algorithms; Rabbit stream cipher; failed tests; insertion attack effects; pseudorandom number generator; random bits; randomness property; Ciphers; Entropy; Generators; NIST; Rabbits; insertion attack; pseudorandom number generator (PRNG); random; random number generator (RNG);
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer, Control, Informatics and Its Applications (IC3INA), 2014 International Conference on
  • Conference_Location
    Bandung
  • Print_ISBN
    978-1-4799-4577-1
  • Type

    conf

  • DOI
    10.1109/IC3INA.2014.7042624
  • Filename
    7042624