TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Provable Security of Linux-DRBG in the Seedless Robustness Model [pdf]

43 pointsby zx2c48 months ago

1 comment

colmmacc8 months ago
I love this work! but my heart breaks that this DRBG won&#x27;t see much use in many commercial and government environments. Businesses with Federal government customers are often required to use FIPS validated or at least FIPS compatible implementations, which the Blake &#x2F; ChaCha20 construction definitely isn&#x27;t. Businesses don&#x27;t want to maintain multiple versions, so in practice they just switch to the FIPS mode implementation and that&#x27;s what actually gets used.<p>This reflects a schism in the cryptography world; organizations that have to do what NIST says, which is basically AES, SHA2, SHA3, HMAC, and the new PQ suites, each the result of competitions and a lot of academic analysis, and open source cryptographers who prefer Blake, ChaCha20, 25519, and other algorithms that have been developed in the open and with a stronger emphasis on performance.<p>Even though this work is great and proves some of the DRBG security to the same extent as other DRBGs, I doubt we&#x27;ll see the DRBG added to the approve NISTs lists ever. Just not how it works.
评论 #41563098 未加载
评论 #41575152 未加载