Practical Detection of Entropy Loss in Pseudo-Random Number Generators
Title | Practical Detection of Entropy Loss in Pseudo-Random Number Generators |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Dörre, Felix, Klebanov, Vladimir |
Conference Name | Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4139-4 |
Keywords | bounded model checking, Collaboration, composability, entropy loss, Human Behavior, information assurance, information flow, information theoretic security, Metrics, OpenSSL, PRNG, pseudo-random number generator, pubcrawl, Resiliency, Scalability, static analysis |
Abstract | Pseudo-random number generators (PRNGs) are a critical infrastructure for cryptography and security of many computer applications. At the same time, PRNGs are surprisingly difficult to design, implement, and debug. This paper presents the first static analysis technique specifically for quality assurance of cryptographic PRNG implementations. The analysis targets a particular kind of implementation defect, the entropy loss. Entropy loss occurs when the entropy contained in the PRNG seed is not utilized to the full extent for generating the pseudo-random output stream. The Debian OpenSSL disaster, probably the most prominent PRNG-related security incident, was one but not the only manifestation of such a defect. Together with the static analysis technique, we present its implementation, a tool named Entroposcope. The tool offers a high degree of automation and practicality. We have applied the tool to five real-world PRNGs of different designs and show that it effectively detects both known and previously unknown instances of entropy loss. |
URL | http://doi.acm.org/10.1145/2976749.2978369 |
DOI | 10.1145/2976749.2978369 |
Citation Key | dorre_practical_2016 |