Re: Pseudorandom Number Generator in Ansi X9.17

2005-11-15 Thread Travis H.
In Practical Cryptography, Schneier discusses a new PRNG design called Fortuna.

It has some neat features.

He also discusses problems with the ANSI PRNG here:

http://www.schneier.com/paper-prngs.html
--
http://www.lightconsulting.com/~travis/  --
We already have enough fast, insecure systems. -- Schneier  Ferguson
GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Pseudorandom Number Generator in Ansi X9.17

2005-11-13 Thread Ben Laurie
Terence Joseph wrote:
 Hi,
 
 The Pseudorandom Number Generator specified in Ansi X9.17 used to be one
 of the best PRNGs available if I am correct.

It was? When? I had to replace the OpenSSL PRNG with X9.31 (as has been
discussed elsewhere, this is the same PRNG) for the FIPS-140
certification, and in my opinion it was a large step backwards.

-- 
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Pseudorandom Number Generator in Ansi X9.17

2005-11-10 Thread Terence Joseph

Hi,

The Pseudorandom Number Generator specified in Ansi X9.17 used to be one of 
the best PRNGs available if I am correct.  I was just wondering if this is 
still considered to be the case?  Is it widely used in practical situations 
or is there some better implementation available?  What would be the 
advantages/disadvantages of modifying the Ansi X9.17 PRNG to use AES instead 
of 3DES? Is this feasible at all?


Best Regards,
Terence

_
Dating has never been easier - get FREE Match.com membership! 
http://match.msn.ie/match/mt.cfm?pg=channeltcid=237596



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Pseudorandom Number Generator in Ansi X9.17

2005-11-10 Thread Alexander Klimov
On Thu, 10 Nov 2005, Terence Joseph wrote:
 The Pseudorandom Number Generator specified in Ansi X9.17 used to be one of
 the best PRNGs available if I am correct.  I was just wondering if this is
 still considered to be the case?  Is it widely used in practical situations
 or is there some better implementation available?  What would be the
 advantages/disadvantages of modifying the Ansi X9.17 PRNG to use AES instead
 of 3DES? Is this feasible at all?

It is now called ANSI X9.31 Appendix A.2.4

 http://csrc.nist.gov/CryptoToolkit/tkrng.html

and yes, there is

 NIST-Recommended Random Number Generator
 Based on ANSI X9.31 Appendix A.2.4
 Using the 3-Key Triple DES and AES Algorithms

 http://csrc.nist.gov/cryptval/rng/931rngext.pdf

Btw, anybody was lucky enough to cache the draft of X9.82 which was
posted on the NIST site some time ago?

-- 
Regards,
ASK

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Pseudorandom Number Generator in Ansi X9.17

2005-11-10 Thread Jack Lloyd
On Thu, Nov 10, 2005 at 10:33:18AM +, Terence Joseph wrote:
 Hi,
 
 The Pseudorandom Number Generator specified in Ansi X9.17 used to be one of 
 the best PRNGs available if I am correct.  I was just wondering if this is 
 still considered to be the case?  Is it widely used in practical situations 
 or is there some better implementation available?  What would be the 
 advantages/disadvantages of modifying the Ansi X9.17 PRNG to use AES 
 instead of 3DES? Is this feasible at all?

Asides from the relatively small internal state, and the state compromise
extension problems noted by Schneier, Wagner, et al, X9.17/X9.31 are AFAIK good
PRNGs. It is very trivial to use AES instead of 3DES (just swap out the
algorithms, and change the size of the various internal values to match the
128-bit block size), and you get a larger keyspace, larger internal state, and
faster operation, so I'd say doing so is a complete win.

Technically, X9.17 has been withdrawn by ANSI, but X9.31 contains the exact
same PRNG in Appenxix A.2.4. ANSI still requires 2-key 3DES, but NIST allows
the use of 3-key 3DES or of AES with any keylength instead.

-Jack

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]