On Mar 17, 2014, at 7:42 AM, Dan Brown <[email protected]> wrote:
> Two issues:
>
> 1. If it is unclear to me from the 4086 description of BBS whether the
> state s_i is to be updated after each output. I believe that the state should
> be updated to improve backtracking resistance. (Otherwise, it would be
> affected by a similar weak backtracking attack to the one DSS RNG, i.e.
> current state compromise the latest output can be distinguished from random.)
> 2. Does the secret state include p and q? If so, then the BBS suffers
> from a more severe backtracking attack: recovering the current state allows
> recovery of all the previous states, because p and q allows one to compute
> square roots. This would undermine forward security applications.
>
Yes, it does suffer from that same problem. While BBS has number-theoretic
proofs of security, those proofs presume a random, unknown p and q. I've said
that this is pushing the randomness problem down to the turtle below you.
I wrote a missive on the Cryptography list around the turn of the year in which
I said that the EC DRBGs have this problem -- you get randomness providing you
have a secret key, but how did you get *that*? -- going back to BBS. If you
want, I'll dredge it up and post here.
Jon
_______________________________________________
dsfjdssdfsd mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dsfjdssdfsd