Dual EC DRBG, the Glossary
Dual_EC_DRBG (Dual Elliptic Curve Deterministic Random Bit Generator) is an algorithm that was presented as a cryptographically secure pseudorandom number generator (CSPRNG) using methods in elliptic curve cryptography.[1]
Table of Contents
58 relations: Advantage (cryptography), American National Standards Institute, Ars Technica, Backdoor (computing), BlackBerry, BlackBerry Limited, Bruce Schneier, BSAFE, Bullrun (decryption program), Computational hardness assumption, Crypto AG, Cryptographic nonce, Cryptographically secure pseudorandom number generator, Cryptography, Cryptology ePrint Archive, Cryptovirology, Dan Shumow, Daniel J. Bernstein, Decisional Diffie–Hellman assumption, Der Spiegel, Edward Snowden, Elliptic curve, Elliptic-curve cryptography, FIPS 140-2, Information security, Institute of Electrical and Electronics Engineers, International Organization for Standardization, Jeffrey Carr, John Kelsey (cryptanalyst), Juniper Networks, Kleptography, Mathematical constant, Matt Blaze, Matthew D. Green, Microsoft, Microsoft Developer Network, Moti Yung, National Institute of Standards and Technology, National Security Agency, Niels Ferguson, NIST SP 800-90A, NOBUS, Nothing-up-my-sleeve number, OpenSSL, Passive-aggressive behavior, Pi, Provable security, Random number generator attack, ResearchGate, RSA Conference, ... Expand index (8 more) »
- Broken cryptography algorithms
- Kleptography
- National Institute of Standards and Technology
- Pseudorandom number generators
Advantage (cryptography)
In cryptography, an adversary's advantage is a measure of how successfully it can attack a cryptographic algorithm, by distinguishing it from an idealized version of that type of algorithm.
See Dual EC DRBG and Advantage (cryptography)
American National Standards Institute
The American National Standards Institute (ANSI) is a private nonprofit organization that oversees the development of voluntary consensus standards for products, services, processes, systems, and personnel in the United States.
See Dual EC DRBG and American National Standards Institute
Ars Technica
Ars Technica is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.
See Dual EC DRBG and Ars Technica
Backdoor (computing)
A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer"—a tiny computer-within-a-computer such as that found in Intel's AMT technology).
See Dual EC DRBG and Backdoor (computing)
BlackBerry
BlackBerry is a discontinued brand of smartphones and other related mobile services and devices.
See Dual EC DRBG and BlackBerry
BlackBerry Limited
BlackBerry Limited (formerly Research In Motion or RIM for short) is a Canadian software company specializing in cybersecurity.
See Dual EC DRBG and BlackBerry Limited
Bruce Schneier
Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer.
See Dual EC DRBG and Bruce Schneier
BSAFE
Dell BSAFE, formerly known as RSA BSAFE, is a FIPS 140-2 validated cryptography library, available in both C and Java. BSAFE was initially created by RSA Security, which was purchased by EMC and then, in turn, by Dell.
Bullrun (decryption program)
Bullrun (stylized BULLRUN) is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA).
See Dual EC DRBG and Bullrun (decryption program)
Computational hardness assumption
In computational complexity theory, a computational hardness assumption is the hypothesis that a particular problem cannot be solved efficiently (where efficiently typically means "in polynomial time").
See Dual EC DRBG and Computational hardness assumption
Crypto AG
Crypto AG was a Swiss company specialising in communications and information security founded by Boris Hagelin in 1952.
See Dual EC DRBG and Crypto AG
Cryptographic nonce
In cryptography, a nonce is an arbitrary number that can be used just once in a cryptographic communication.
See Dual EC DRBG and Cryptographic nonce
Cryptographically secure pseudorandom number generator
A cryptographically secure pseudorandom number generator (CSPRNG) or cryptographic pseudorandom number generator (CPRNG) is a pseudorandom number generator (PRNG) with properties that make it suitable for use in cryptography.
See Dual EC DRBG and Cryptographically secure pseudorandom number generator
Cryptography
Cryptography, or cryptology (from κρυπτός|translit.
See Dual EC DRBG and Cryptography
Cryptology ePrint Archive
The Cryptology ePrint Archive is an electronic archive (eprint) of new results in the field of cryptography, maintained by the International Association for Cryptologic Research.
See Dual EC DRBG and Cryptology ePrint Archive
Cryptovirology
Cryptovirology refers to the study of cryptography use in malware, such as ransomware and asymmetric backdoors.
See Dual EC DRBG and Cryptovirology
Dan Shumow
Dan Shumow is a cryptographer working at Microsoft Research.
See Dual EC DRBG and Dan Shumow
Daniel J. Bernstein
Daniel Julius Bernstein (sometimes known as djb; born October 29, 1971) is an American mathematician, cryptologist, and computer scientist.
See Dual EC DRBG and Daniel J. Bernstein
Decisional Diffie–Hellman assumption
The decisional Diffie–Hellman (DDH) assumption is a computational hardness assumption about a certain problem involving discrete logarithms in cyclic groups.
See Dual EC DRBG and Decisional Diffie–Hellman assumption
Der Spiegel
(stylized in all caps) is a German weekly news magazine published in Hamburg.
See Dual EC DRBG and Der Spiegel
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is a former American NSA intelligence contractor and a whistleblower who leaked classified documents revealing the existence of global surveillance programs.
See Dual EC DRBG and Edward Snowden
Elliptic curve
In mathematics, an elliptic curve is a smooth, projective, algebraic curve of genus one, on which there is a specified point.
See Dual EC DRBG and Elliptic curve
Elliptic-curve cryptography
Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
See Dual EC DRBG and Elliptic-curve cryptography
FIPS 140-2
The Federal Information Processing Standard Publication 140-2, (FIPS PUB 140-2), is a U.S. government computer security standard used to approve cryptographic modules.
See Dual EC DRBG and FIPS 140-2
Information security
Information security, sometimes shortened to infosec, is the practice of protecting information by mitigating information risks.
See Dual EC DRBG and Information security
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) professional association for electronics engineering, electrical engineering, and other related disciplines.
See Dual EC DRBG and Institute of Electrical and Electronics Engineers
International Organization for Standardization
The International Organization for Standardization (ISO) is an independent, non-governmental, international standard development organization composed of representatives from the national standards organizations of member countries.
See Dual EC DRBG and International Organization for Standardization
Jeffrey Carr
Jeffrey Carr is a cybersecurity author, researcher, entrepreneur and consultant, who focuses on cyber warfare.
See Dual EC DRBG and Jeffrey Carr
John Kelsey (cryptanalyst)
John Kelsey is a cryptographer who works at NIST.
See Dual EC DRBG and John Kelsey (cryptanalyst)
Juniper Networks
Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California.
See Dual EC DRBG and Juniper Networks
Kleptography
Kleptography is the study of stealing information securely and subliminally.
See Dual EC DRBG and Kleptography
Mathematical constant
A mathematical constant is a key number whose value is fixed by an unambiguous definition, often referred to by a special symbol (e.g., an alphabet letter), or by mathematicians' names to facilitate using it across multiple mathematical problems.
See Dual EC DRBG and Mathematical constant
Matt Blaze
Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management.
See Dual EC DRBG and Matt Blaze
Matthew D. Green
Matthew Daniel Green (born 1976) is an American cryptographer and security technologist.
See Dual EC DRBG and Matthew D. Green
Microsoft
Microsoft Corporation is an American multinational corporation and technology company headquartered in Redmond, Washington.
See Dual EC DRBG and Microsoft
Microsoft Developer Network
Microsoft Developer Network (MSDN) was the division of Microsoft responsible for managing the firm's relationship with developers and testers, such as hardware developers interested in the operating system (OS), and software developers developing on the various OS platforms or using the API or scripting languages of Microsoft's applications.
See Dual EC DRBG and Microsoft Developer Network
Moti Yung
Mordechai M. "Moti" Yung is a cryptographer and computer scientist known for his work on cryptovirology and kleptography.
See Dual EC DRBG and Moti Yung
National Institute of Standards and Technology
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness.
See Dual EC DRBG and National Institute of Standards and Technology
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI).
See Dual EC DRBG and National Security Agency
Niels Ferguson
Niels T. Ferguson (born 10 December 1965, Eindhoven) is a Dutch cryptographer and consultant who currently works for Microsoft.
See Dual EC DRBG and Niels Ferguson
NIST SP 800-90A
NIST SP 800-90A ("SP" stands for "special publication") is a publication by the National Institute of Standards and Technology with the title Recommendation for Random Number Generation Using Deterministic Random Bit Generators. Dual EC DRBG and NIST SP 800-90A are Broken cryptography algorithms, kleptography, national Institute of Standards and Technology, national Security Agency and pseudorandom number generators.
See Dual EC DRBG and NIST SP 800-90A
NOBUS
NOBUS ("Nobody But Us") is a term used by the United States National Security Agency (NSA) to describe a known security vulnerability that it believes the United States (US) alone can exploit. Dual EC DRBG and NOBUS are national Security Agency.
Nothing-up-my-sleeve number
In cryptography, nothing-up-my-sleeve numbers are any numbers which, by their construction, are above suspicion of hidden properties.
See Dual EC DRBG and Nothing-up-my-sleeve number
OpenSSL
OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end.
Passive-aggressive behavior
Passive-aggressive behavior is characterized by a pattern of passive hostility and an avoidance of direct communication.
See Dual EC DRBG and Passive-aggressive behavior
Pi
The number (spelled out as "pi") is a mathematical constant that is the ratio of a circle's circumference to its diameter, approximately equal to 3.14159.
Provable security
Provable security refers to any type or level of computer security that can be proved.
See Dual EC DRBG and Provable security
Random number generator attack
The security of cryptographic systems depends on some secret data that is known to authorized persons but unknown and unpredictable to others. Dual EC DRBG and Random number generator attack are pseudorandom number generators.
See Dual EC DRBG and Random number generator attack
ResearchGate
ResearchGate is a European commercial social networking site for scientists and researchers to share papers, ask and answer questions, and find collaborators.
See Dual EC DRBG and ResearchGate
RSA Conference
The RSA Conference is a series of IT security conferences.
See Dual EC DRBG and RSA Conference
RSA Security
RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer and network security company with a focus on encryption and encryption standards.
See Dual EC DRBG and RSA Security
Security level
In cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves.
See Dual EC DRBG and Security level
Tanja Lange
Tanja Lange is a German cryptographer and number theorist at the Eindhoven University of Technology.
See Dual EC DRBG and Tanja Lange
The New York Times
The New York Times (NYT) is an American daily newspaper based in New York City.
See Dual EC DRBG and The New York Times
Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network.
See Dual EC DRBG and Transport Layer Security
Windows Registry
The Windows Registry is a hierarchical database that stores low-level settings for the Microsoft Windows operating system and for applications that opt to use the registry.
See Dual EC DRBG and Windows Registry
Windows Vista
Windows Vista is a major release of the Windows NT operating system developed by Microsoft.
See Dual EC DRBG and Windows Vista
Wired (magazine)
Wired (stylized in all caps) is a monthly American magazine, published in print and online editions, that focuses on how emerging technologies affect culture, the economy, and politics.
See Dual EC DRBG and Wired (magazine)
See also
Broken cryptography algorithms
- Cayley–Purser algorithm
- Crypt (C)
- Crypt (Unix)
- Dual EC DRBG
- EMV
- GGH encryption scheme
- MS-CHAP
- Merkle–Hellman knapsack cryptosystem
- Microsoft Point-to-Point Encryption
- NIST SP 800-90A
- Point-to-Point Tunneling Protocol
- RADIUS
- Supersingular isogeny key exchange
- Temporal Key Integrity Protocol
- Wi-Fi Protected Setup
- Wired Equivalent Privacy
Kleptography
- Clipper chip
- Dual EC DRBG
- Kleptography
- NIST SP 800-90A
- XZ Utils backdoor
National Institute of Standards and Technology
- Advanced Encryption Standard process
- Advanced Technology Program
- Advisory Committee on Earthquake Hazards Reduction
- Biometric Consortium
- Dual EC DRBG
- FOSDIC
- Federal Information Processing Standards
- Genome in a Bottle
- Harry Diamond Laboratories
- ISCC–NBS system
- Iris Challenge Evaluation
- JILA
- Journal of Research of the National Institute of Standards and Technology
- Jun Ye
- Lauriston S. Taylor
- Malcolm Baldrige National Quality Award
- Manufacturing USA
- NIST Cybersecurity Framework
- NIST SP 800-90A
- NIST SP 800-90B
- NIST Special Publication 800-53
- NIST Special Publication 800-92
- NIST World Trade Center Disaster Investigation
- NIST hash function competition
- NIST stone test wall
- NIST-7
- NIST-F1
- NIST-F2
- National Cybersecurity FFRDC
- National Initiative for Cybersecurity Education
- National Institute of Standards and Technology
- National Software Reference Library
- National Voluntary Laboratory Accreditation Program
- SWAC (computer)
- Samuel Wesley Stratton Award
- Technical Guidelines Development Committee
- WWV (radio station)
- WWVB
- WWVH
Pseudorandom number generators
- ACORN (random number generator)
- Alias method
- Analog feedback shift register
- Blum Blum Shub
- Combined linear congruential generator
- Complementary sequences
- Counter-based random number generator
- CryptGenRandom
- Dual EC DRBG
- Entropy (computing)
- Feedback with Carry Shift Registers
- Fortuna (PRNG)
- Full cycle
- Generalized inversive congruential pseudorandom numbers
- Inversive congruential generator
- KISS (algorithm)
- Lagged Fibonacci generator
- Lehmer random number generator
- Linear congruential generator
- Linear-feedback shift register
- List of random number generators
- MIXMAX generator
- Marsaglia polar method
- Mersenne Twister
- Middle-square method
- Multiply-with-carry pseudorandom number generator
- NIST SP 800-90A
- NIST SP 800-90B
- Naor–Reingold pseudorandom function
- Next-bit test
- Non-uniform random variate generation
- Permuted congruential generator
- Pseudorandom number generator
- RANDU
- RC4
- Random number generator attack
- Random seed
- Ratio of uniforms
- Self-shrinking generator
- Shrinking generator
- Solitaire (cipher)
- Spectral test
- Subtract with carry
- Well equidistributed long-period linear
- Wichmann–Hill
- Xoroshiro128+
- Xorshift
- Yarrow algorithm
- Ziggurat algorithm
References
[1] https://en.wikipedia.org/wiki/Dual_EC_DRBG
Also known as Dual EC, Dual Elliptic Curve DRBG, Dual Elliptic Curve Deterministic RBG, Dual Elliptic Curve Deterministic Random Bit Generator.
, RSA Security, Security level, Tanja Lange, The New York Times, Transport Layer Security, Windows Registry, Windows Vista, Wired (magazine).