Review of Key Derivation Functions in Cryptographic Systems

نویسندگان

چکیده

Because of its significance in the formation core encryption/decryption algorithms, key derivation function (KDF) or pseudorandom number generator (PRNG) plays a major part cryptographic system. Random numbers are required for usage encryption and decryption techniques variety network security applications. In this research we Focus on generation functions, which an important aspect symmetric asymmetric algorithms. Disgusting background PRNG basics attempting to characterize evaluate several publications that offer proposals generators.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic Extraction and Key Derivation: The HKDF Scheme

In spite of the central role of key derivation functions (KDF) in applied cryptography, there has been little formal work addressing the design and analysis of general multi-purpose KDFs. In practice, most KDFs (including those widely standardized) follow ad-hoc approaches that treat cryptographic hash functions as perfectly random functions. In this paper we close some gaps between theory and ...

متن کامل

DPLL+ROBDD Derivation Applied to Inversion of Some Cryptographic Functions

The paper presents logical derivation algorithms that can be applied to inversion of polynomially computable discrete functions. The proposed approach is based on the fact that it is possible to organize DPLL derivation on a small subset of variables appeared in a CNF which encodes the algorithm computing the function. The experimental results showed that arrays of conflict clauses generated by...

متن کامل

Cryptographic Hash Functions: A Review

Cryptographic Hash functions are used to achieve a number of security objectives. In this paper, we bring out the importance of hash functions, its various structures, design techniques, attacks and the progressive recent development in this field.

متن کامل

Key Derivation with Physical Unclonable Functions

Secure cryptographic keys are a prerequisite to protect the data that is transmitted and stored by today’s and tomorrows embedded systems in the Internet of Things. For many of those systems, secure Non-Volatile Memory (NVM) is not available due to technical and cost constraints. Silicon Physical Unclonable Functions (PUFs) evaluate manufacturing variations to generate unique secrets inside Int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mag?allat? al-qa?disiyyaat? li-l-?ulu?m al-s?irfat?

سال: 2023

ISSN: ['1997-2490', '2411-3514']

DOI: https://doi.org/10.29350/2411-3514.1011