Insertion attack effects on some PRNGs based on NIST randomness tests tool: Case study on ANSI-X9.17, ANSIX9.31, Dragon and Rabbit algorithms

S. Indarjani, Gigih Supriyatno, A. Nugraha, I Made Mustika Astawa
{"title":"Insertion attack effects on some PRNGs based on NIST randomness tests tool: Case study on ANSI-X9.17, ANSIX9.31, Dragon and Rabbit algorithms","authors":"S. Indarjani, Gigih Supriyatno, A. Nugraha, I Made Mustika Astawa","doi":"10.1109/IC3INA.2014.7042624","DOIUrl":null,"url":null,"abstract":"Based on previous research [1], the 1-bit insertion attack with random bits on AES-based PRNG had some effects on randomness property of the output sequences after the attack, where about 8 from total 45 experiments (17.17%) had failed test at most 3 tests on AES-128, 11 experiments from 45 (24.44%) on AES-192 mostly had one failed test where only one experiment has two failed tests, and on AES 256 we got 10 experiments from 45 (22.22%) had failed test at most 3 tests, where 8 of them just have one test. So globally the 1-bit insertion attack with random bits affected the randomness property of AES-based PRNG even not significant based on NIST randomness tests under α =0.01. In this research, we also expand the case study on the other 4 algorithms ANSI X9.17, X9.31, Dragon and Rabbit Stream Cipher. The scenario still the same with level of significant α = 0.01. From the experiments, we found that the insertion attack with random bits on the four algorithms has affected the randomness property of the output sequences after the attack indicated by at least 2 experiments from 30 experiments on each algorithms has failed tests at most 2 tests on average on each experiment. The effects are increasing for higher intensity level. Among the 4 algorithms, the Dragon-based algorithm is stronger against the three other algorithms indicated by only 2 failed tests occurred in two different experiments. It is also shown that the insertion attack effect with extreme bits is very significant which may danger the randomness of the target PRNG that should be anticipated.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3INA.2014.7042624","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Based on previous research [1], the 1-bit insertion attack with random bits on AES-based PRNG had some effects on randomness property of the output sequences after the attack, where about 8 from total 45 experiments (17.17%) had failed test at most 3 tests on AES-128, 11 experiments from 45 (24.44%) on AES-192 mostly had one failed test where only one experiment has two failed tests, and on AES 256 we got 10 experiments from 45 (22.22%) had failed test at most 3 tests, where 8 of them just have one test. So globally the 1-bit insertion attack with random bits affected the randomness property of AES-based PRNG even not significant based on NIST randomness tests under α =0.01. In this research, we also expand the case study on the other 4 algorithms ANSI X9.17, X9.31, Dragon and Rabbit Stream Cipher. The scenario still the same with level of significant α = 0.01. From the experiments, we found that the insertion attack with random bits on the four algorithms has affected the randomness property of the output sequences after the attack indicated by at least 2 experiments from 30 experiments on each algorithms has failed tests at most 2 tests on average on each experiment. The effects are increasing for higher intensity level. Among the 4 algorithms, the Dragon-based algorithm is stronger against the three other algorithms indicated by only 2 failed tests occurred in two different experiments. It is also shown that the insertion attack effect with extreme bits is very significant which may danger the randomness of the target PRNG that should be anticipated.
基于NIST随机测试工具的插入攻击对部分prng的影响:以ANSI-X9.17、ANSIX9.31、Dragon和Rabbit算法为例
基于之前的研究[1],比特插入攻击与随机比特AES-based PRNG有一些影响输出序列的随机属性攻击后,大约从总45实验(17.17%)没有对AES - 128测试最多3测试,11个实验从AES - 192主要是45例(24.44%)有一个失败的测试,只有一个实验中有两个失败的测试,和AES 256我们有10实验从45(22.22%)没有测试最多3测试,其中8个人只有一个测试。因此,在α =0.01条件下,NIST随机测试表明,随机位的1位插入攻击对基于aes的PRNG的随机性影响不显著。在本研究中,我们还扩展了其他4种算法ANSI X9.17, X9.31,龙和兔流密码的案例研究。在显著水平α = 0.01时,情景仍然相同。从实验中我们发现,在每种算法的30次实验中,至少有2次实验表明攻击失败,每次实验平均不超过2次,对四种算法的随机位插入攻击都影响了输出序列的随机性。强度越高,效果越明显。在这4种算法中,基于dragon的算法相对于其他3种算法更强,在两次不同的实验中只有2次测试失败。结果还表明,极端位的插入攻击效应非常显著,可能会危及目标PRNG的随机性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信