Name: draft-eastlake-randomness2-09
Title: Randomness Requirements for Security
State: Pending
Authors: Donald Eastlake, Jeffrey Schiller, Stephen Crocker
Group: Individual Submissions (none)
Date: 2004-10-26
Security systems are built on strong cryptographic algorithms that foil
pattern analysis attempts. However, the security of these systems is
dependent on generating secret quantities for passwords, cryptographic
keys, and similar quantities. The use of pseudo-random processes to
generate secret quantities can result in pseudo- security. The
sophisticated attacker of these security systems may find it easier to
reproduce the environment that produced the secret quantities, searching
the resulting small set of possibilities, than to locate the quantities in
the whole of the potential number space.
|
|
|