World News Trust World News Trust
World News Trust World News Trust
  • News Portal
  • All Content
    • Edited
      • News
      • Commentary
      • Analysis
      • Advisories
      • Source
    • Flatwire
  • Topics
    • Agriculture
    • Culture
      • Arts
      • Children
      • Education
      • Entertainment
      • Food and Hunger
      • Sports
    • Disasters
    • Economy
    • Energy
    • Environment
    • Government
    • Health
    • Media
    • Science
    • Spiritual
    • Technology
    • Transportation
    • War
  • Regions
    • Africa
    • Americas
      • North America
      • South America
    • Antarctica
    • Arctic
    • Asia
    • Australia/Oceania
    • Europe
    • Middle East
    • Oceans
      • Arctic Ocean
      • Atlantic Ocean
      • Indian Ocean
      • Pacific Ocean
      • Southern Ocean
    • Space
  • World Desk
    • Submit Content
  • About Us
  • Sign In/Out
  • Register
  • Site Map
  • Contact Us
  • How Palestinians Defeated Netanyahu and Redefined ‘Unity’ | Ramzy Baroud
  • Transphobia | Wikipedia
  • Did Entheogens Cause Human Intelligence? | Bard
  • How To Deinstitutionalize The Practice Of Human Warfare | Bard
  • How Khader Adnan Unified Palestinians from His Prison Cell | Ramzy Baroud
  • European Cities Boycott Apartheid Israel | Ramzy Baroud
  • No Respite from the Slow-Motion US-China Collision | Nouriel Roubini

Proof of randomness builds future of digital security | Katherine Q. Ye

More items by author
Categories
Edited | Front Page Stories | All Content | Education | Finance | Business | Science | North America | News | News -- WNT Selected
Tool Bar
View Comments

Credit: CC0 Public DomainCredit: CC0 Public Domain

Dec. 22, 2017 (Phys.org) -- In an effort to block emerging threats to online security, researchers at Princeton University have developed a method to verify the strength of random number generators that form the basis of most encryption systems.

Nearly all secure online traffic -- from shopping to banking to communications -- relies on a technique of randomly generating a number that serves as a key to unlock encrypted communication. The problem is that small programming errors can make these systems vulnerable, and those vulnerabilities can often be very difficult to detect.

"Whenever you connect up to Amazon to give them your credit card number, whenever you log in somewhere through a secure connection, you're depending on randomly generated cryptographic keys," said Andrew Appel, the Eugene Higgins Professor of Computer Science at Princeton and leader of the research team. "And if the adversary, the spy who is trying to read your messages or impersonate you, could guess what random number your computer was using, then it could know what key you're going to be using and it could impersonate your traffic and read your messages."

In a paper presented to the Association for Computing Machinery 2017 Conference on Computer and Communications Security on Nov. 2, the researchers said it may be impossible to tell whether a number generatoris compromised without examining the generators' source code (and without proper methods, difficult to guarantee security even with access to the code). The programs, called Deterministic Random Bit Generators or DRBGs, are tested typically by analyzing their outputs, either statistically or by using a set of tests to check the results. But the researchers said these methods cannot guarantee the generators' proper function.

"Despite the importance of DRBGs, their development has not received the scrutiny it deserves," the researchers write in their article.

(more)

READ MORE: Phys.org

back to top
  • Created
    Friday, December 22 2017
  • Last modified
    Wednesday, December 27 2017
  1. You are here:  
  2. Home
  3. All Content
  4. Edited
  5. Proof of randomness builds future of digital security | Katherine Q. Ye
Copyright © 2023 World News Trust. All Rights Reserved.
Joomla! is Free Software released under the GNU General Public License.