en.unionpedia.org

Dual EC DRBG, the Glossary

Index Dual EC DRBG

Dual_EC_DRBG (Dual Elliptic Curve Deterministic Random Bit Generator) is an algorithm that was presented as a cryptographically secure pseudorandom number generator (CSPRNG) using methods in elliptic curve cryptography.[1]

Table of Contents

  1. 58 relations: Advantage (cryptography), American National Standards Institute, Ars Technica, Backdoor (computing), BlackBerry, BlackBerry Limited, Bruce Schneier, BSAFE, Bullrun (decryption program), Computational hardness assumption, Crypto AG, Cryptographic nonce, Cryptographically secure pseudorandom number generator, Cryptography, Cryptology ePrint Archive, Cryptovirology, Dan Shumow, Daniel J. Bernstein, Decisional Diffie–Hellman assumption, Der Spiegel, Edward Snowden, Elliptic curve, Elliptic-curve cryptography, FIPS 140-2, Information security, Institute of Electrical and Electronics Engineers, International Organization for Standardization, Jeffrey Carr, John Kelsey (cryptanalyst), Juniper Networks, Kleptography, Mathematical constant, Matt Blaze, Matthew D. Green, Microsoft, Microsoft Developer Network, Moti Yung, National Institute of Standards and Technology, National Security Agency, Niels Ferguson, NIST SP 800-90A, NOBUS, Nothing-up-my-sleeve number, OpenSSL, Passive-aggressive behavior, Pi, Provable security, Random number generator attack, ResearchGate, RSA Conference, ... Expand index (8 more) »

  2. Broken cryptography algorithms
  3. Kleptography
  4. National Institute of Standards and Technology
  5. Pseudorandom number generators

Advantage (cryptography)

In cryptography, an adversary's advantage is a measure of how successfully it can attack a cryptographic algorithm, by distinguishing it from an idealized version of that type of algorithm.

See Dual EC DRBG and Advantage (cryptography)

American National Standards Institute

The American National Standards Institute (ANSI) is a private nonprofit organization that oversees the development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States.

See Dual EC DRBG and American National Standards Institute

Ars Technica

Ars Technica is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.

See Dual EC DRBG and Ars Technica

Backdoor (computing)

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer"—a tiny computer-within-a-computer such as that found in Intel's AMT technology).

See Dual EC DRBG and Backdoor (computing)

BlackBerry

BlackBerry is a discontinued brand of smartphones and other related mobile services and devices.

See Dual EC DRBG and BlackBerry

BlackBerry Limited

BlackBerry Limited (formerly Research In Motion or RIM for short) is a Canadian software company specializing in cybersecurity.

See Dual EC DRBG and BlackBerry Limited

Bruce Schneier

Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer.

See Dual EC DRBG and Bruce Schneier

BSAFE

Dell BSAFE, formerly known as RSA BSAFE, is a FIPS 140-2 validated cryptography library, available in both C and Java. BSAFE was initially created by RSA Security, which was purchased by EMC and then, in turn, by Dell.

See Dual EC DRBG and BSAFE

Bullrun (decryption program)

Bullrun (stylized BULLRUN) is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA).

See Dual EC DRBG and Bullrun (decryption program)

Computational hardness assumption

In computational complexity theory, a computational hardness assumption is the hypothesis that a particular problem cannot be solved efficiently (where efficiently typically means "in polynomial time").

See Dual EC DRBG and Computational hardness assumption

Crypto AG

Crypto AG was a Swiss company specialising in communications and information security founded by Boris Hagelin in 1952.

See Dual EC DRBG and Crypto AG

Cryptographic nonce

In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication.

See Dual EC DRBG and Cryptographic nonce

Cryptographically secure pseudorandom number generator

A cryptographically secure pseudorandom number generator (CSPRNG) or cryptographic pseudorandom number generator (CPRNG) is a pseudorandom number generator (PRNG) with properties that make it suitable for use in cryptography.

See Dual EC DRBG and Cryptographically secure pseudorandom number generator

Cryptography

Cryptography, or cryptology (from κρυπτός|translit.

See Dual EC DRBG and Cryptography

Cryptology ePrint Archive

The Cryptology ePrint Archive is an electronic archive (eprint) of new results in the field of cryptography, maintained by the International Association for Cryptologic Research.

See Dual EC DRBG and Cryptology ePrint Archive

Cryptovirology

Cryptovirology refers to the study of cryptography use in malware, such as ransomware and asymmetric backdoors.

See Dual EC DRBG and Cryptovirology

Dan Shumow

Dan Shumow is a cryptographer working at Microsoft Research.

See Dual EC DRBG and Dan Shumow

Daniel J. Bernstein

Daniel Julius Bernstein (sometimes known as djb; born October 29, 1971) is an American mathematician, cryptologist, and computer scientist.

See Dual EC DRBG and Daniel J. Bernstein

Decisional Diffie–Hellman assumption

The decisional Diffie–Hellman (DDH) assumption is a computational hardness assumption about a certain problem involving discrete logarithms in cyclic groups.

See Dual EC DRBG and Decisional Diffie–Hellman assumption

Der Spiegel

(stylized in all caps) is a German weekly news magazine published in Hamburg.

See Dual EC DRBG and Der Spiegel

Edward Snowden

Edward Joseph Snowden (born June 21, 1983) is a former American NSA intelligence contractor and a whistleblower who leaked classified documents revealing the existence of global surveillance programs.

See Dual EC DRBG and Edward Snowden

Elliptic curve

In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point.

See Dual EC DRBG and Elliptic curve

Elliptic-curve cryptography

Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.

See Dual EC DRBG and Elliptic-curve cryptography

FIPS 140-2

The Federal Information Processing Standard Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules.

See Dual EC DRBG and FIPS 140-2

Information security

Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks.

See Dual EC DRBG and Information security

Institute of Electrical and Electronics Engineers

The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) professional association for electronics engineering, electrical engineering, and other related disciplines.

See Dual EC DRBG and Institute of Electrical and Electronics Engineers

International Organization for Standardization

The International Organization for Standardization (ISO) is an independent, non-governmental, international standard development organization composed of representatives from the national standards organizations of member countries.

See Dual EC DRBG and International Organization for Standardization

Jeffrey Carr

Jeffrey Carr is a cybersecurity author, researcher, entrepreneur and consultant, who focuses on cyber warfare.

See Dual EC DRBG and Jeffrey Carr

John Kelsey (cryptanalyst)

John Kelsey is a cryptographer who works at NIST.

See Dual EC DRBG and John Kelsey (cryptanalyst)

Juniper Networks

Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California.

See Dual EC DRBG and Juniper Networks

Kleptography

Kleptography is the study of stealing information securely and subliminally.

See Dual EC DRBG and Kleptography

Mathematical constant

A mathematical constant is a key number whose value is fixed by an unambiguous definition, often referred to by a special symbol (e.g., an alphabet letter), or by mathematicians' names to facilitate using it across multiple mathematical problems.

See Dual EC DRBG and Mathematical constant

Matt Blaze

Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management.

See Dual EC DRBG and Matt Blaze

Matthew D. Green

Matthew Daniel Green (born 1976) is an American cryptographer and security technologist.

See Dual EC DRBG and Matthew D. Green

Microsoft

Microsoft Corporation is an American multinational corporation and technology company headquartered in Redmond, Washington.

See Dual EC DRBG and Microsoft

Microsoft Developer Network

Microsoft Developer Network (MSDN) was the division of Microsoft responsible for managing the firm's relationship with developers and testers, such as hardware developers interested in the operating system (OS), and software developers developing on the various OS platforms or using the API or scripting languages of Microsoft's applications.

See Dual EC DRBG and Microsoft Developer Network

Moti Yung

Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.

See Dual EC DRBG and Moti Yung

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness.

See Dual EC DRBG and National Institute of Standards and Technology

National Security Agency

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI).

See Dual EC DRBG and National Security Agency

Niels Ferguson

Niels T. Ferguson (born 10 December 1965, Eindhoven) is a Dutch cryptographer and consultant who currently works for Microsoft.

See Dual EC DRBG and Niels Ferguson

NIST SP 800-90A

NIST SP 800-90A ("SP" stands for "special publication") is a publication by the National Institute of Standards and Technology with the title Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Dual EC DRBG and NIST SP 800-90A are Broken cryptography algorithms, kleptography, national Institute of Standards and Technology, national Security Agency and pseudorandom number generators.

See Dual EC DRBG and NIST SP 800-90A

NOBUS

NOBUS ("Nobody But Us") is a term used by the United States National Security Agency (NSA) to describe a known security vulnerability that it believes the United States (US) alone can exploit. Dual EC DRBG and NOBUS are national Security Agency.

See Dual EC DRBG and NOBUS

Nothing-up-my-sleeve number

In cryptography, nothing-up-my-sleeve numbers are any numbers which, by their construction, are above suspicion of hidden properties.

See Dual EC DRBG and Nothing-up-my-sleeve number

OpenSSL

OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end.

See Dual EC DRBG and OpenSSL

Passive-aggressive behavior

Passive-aggressive behavior is characterized by a pattern of passive hostility and an avoidance of direct communication.

See Dual EC DRBG and Passive-aggressive behavior

Pi

The number (spelled out as "pi") is a mathematical constant that is the ratio of a circle's circumference to its diameter, approximately equal to 3.14159.

See Dual EC DRBG and Pi

Provable security

Provable security refers to any type or level of computer security that can be proved.

See Dual EC DRBG and Provable security

Random number generator attack

The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. Dual EC DRBG and Random number generator attack are pseudorandom number generators.

See Dual EC DRBG and Random number generator attack

ResearchGate

ResearchGate is a European commercial social networking site for scientists and researchers to share papers, ask and answer questions, and find collaborators.

See Dual EC DRBG and ResearchGate

RSA Conference

The RSA Conference is a series of IT security conferences.

See Dual EC DRBG and RSA Conference

RSA Security

RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer and network security company with a focus on encryption and encryption standards.

See Dual EC DRBG and RSA Security

Security level

In cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves.

See Dual EC DRBG and Security level

Tanja Lange

Tanja Lange is a German cryptographer and number theorist at the Eindhoven University of Technology.

See Dual EC DRBG and Tanja Lange

The New York Times

The New York Times (NYT) is an American daily newspaper based in New York City.

See Dual EC DRBG and The New York Times

Transport Layer Security

Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.

See Dual EC DRBG and Transport Layer Security

Windows Registry

The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry.

See Dual EC DRBG and Windows Registry

Windows Vista

Windows Vista is a major release of the Windows NT operating system developed by Microsoft.

See Dual EC DRBG and Windows Vista

Wired (magazine)

Wired (stylized in all caps) is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics.

See Dual EC DRBG and Wired (magazine)

See also

Broken cryptography algorithms

Kleptography

National Institute of Standards and Technology

Pseudorandom number generators

References

[1] https://en.wikipedia.org/wiki/Dual_EC_DRBG

Also known as Dual EC, Dual Elliptic Curve DRBG, Dual Elliptic Curve Deterministic RBG, Dual Elliptic Curve Deterministic Random Bit Generator.

, RSA Security, Security level, Tanja Lange, The New York Times, Transport Layer Security, Windows Registry, Windows Vista, Wired (magazine).