Visible to the public Analysis of the Noise Source Entropy Used in OpenSSL’s Random Number Generation Mechanism

TitleAnalysis of the Noise Source Entropy Used in OpenSSL’s Random Number Generation Mechanism
Publication TypeConference Paper
Year of Publication2019
AuthorsHyunki-Kim, Jinhyeok-Oh, Changuk-Jang, Okyeon-Yi, Juhong-Han, Hansaem-Wi, Chanil-Park
Conference Name2019 International Conference on Information and Communication Technology Convergence (ICTC)
Keywordscryptographic key generation, cryptographic random numbers, cryptography, devrandom, Entropy, Human Behavior, IP networks, Metrics, Noise, noise source entropy, open source library, OpenSSL, OpenSSL random number generation, Operating systems, pubcrawl, public domain software, random key generation, random number generation, real-time clock, Resiliency, Scalability, secure socket layer, security protocol, TCP-IP layer, transport protocols, Unix, Unix-like operating systems
AbstractOpenSSL is an open source library that implements the Secure Socket Layer (SSL), a security protocol used by the TCP/IP layer. All cryptographic systems require random number generation for many reasons, such as cryptographic key generation and protocol challenge/response, OpenSSL is also the same. OpenSSL can be run on a variety of operating systems. especially when generating random numbers on Unix-like operating systems, it can use /dev /(u)random [6], as a seed to add randomness. In this paper, we analyze the process provided by OpenSSL when random number generation is required. We also provide considerations for application developers and OpenSSL users to use /dev/urandom and real-time clock (nanoseconds of timespec structure) as a seed to generate cryptographic random numbers in the Unix family.
DOI10.1109/ICTC46691.2019.8939840
Citation Keyhyunki-kim_analysis_2019