An Experimental Analysis on Entropy Estimators for the Entropy Sources Using Predictors of NIST SP 800-90B |
Park, Hojoong
(Kookmin University Department of Financial Information Security)
Bae, Minyoung (Kookmin University Department of Financial Information Security) Yeom, Yongjin (Kookmin University Department of Math. / Financial Information Security) Kang, Ju-Sung (Kookmin University Department of Math. / Financial Information Security) |
1 | NIST, Recommendation for the Entropy Sources Used for Random Bit Generation, NIST DRAFT Special Publication 800-90B, Aug. 2012. |
2 | NIST, Recommendation for Random Bit Generator(RBG) Constructions, NIST Special Publication 800-90C, Aug. 2012. |
3 | H. Kang, Y. Yeom, and J. S. Kang, "An implementation of integrated tool for statistical randomness tests and entropy estimations," in Proc. KICS Winter Conf. 2016, pp. 229-230, Jeongseon, Korea, Jan. 2016. |
4 | NIST, Recommendation for the Entropy Sources Used for Random Bit Generation, (Second DRAFT)NIST Special Publication 800-90B, Jan. 2016. |
5 | C. E. Shannon, "Prediction and entropy of printed English," Bell Syst. Tech. J., vol. 30, no. 1, pp. 50-64, 1951. DOI |
6 | K. Horvath, H. Stogner, A. Uhl, and G. Weinhandel, "Lossless compression of polar iris image data," Pattern Recognition and Image Anal., vol. 6669, pp. 329-337, 2011. DOI |
7 | N. Chater and C. D. Manning, "Probabilistic models of language processing and acquisition," Trends in Cognitive Sci., vol. 10, no. 7, pp. 335-344, 2006. DOI |
8 | R. Collobert, J. Weston, L, Bottou, M. Karlen, K. Kavukcuoglu, and P. Kuksa, "Natural language processing (almost) from scratch," J. Machine Learning Res., pp. 2493-2537, 2011. |
9 | J. Kelsey, K. A. McKay, and M. S. Turan, "Predictive models for min-entropy estimation," CHES 2015, vol. 9293, pp. 373-392, Sept. 2015. |
10 | Y. Kim and K. Yi, "Safety comparision analysis against known/chosen plaintext attack of RBF (Random Block Feedback) mode to other block cipher modes of operation," J. KICS, vol. 39B no. 05, pp. 317-322, 2014. DOI |
11 | H. Park, M. Bae, J. S. Kang, and Y. Yeom, "Key derivation functions using the dual key agreement based on QKD and RSA cryptosystem," J. KICS, vol. 41 no. 04, pp. 479-488, 2016. DOI |
12 | K. J. Ha, C. H. Seo, and D. Y. Kim, "Design of validation system for a crypto-algorithm implementation," J. KICS, vol. 39B no. 04, pp. 242-250, 2014. DOI |
13 | H. Park, M. Bae, Y. Yeom, and J. S. Kang, "A study on the predictor of Non-IID track in SP 800-90B," in Proc. KICS Int. Conf. Commun., pp. 115-116, Jeju, Korea, Jun. 2016. |
14 | D. Salomon, Data Compression: The Complete Reference Fourth Edition, Springer, pp. 189-192, 2007. |
15 | W. Feller, An Introduction to Probability Theory and Its Applications Third Edition, John Wiley & Sons, Inc, pp. 303-341, 1950. |
16 | ID Quantique SA, Retrieved Aug., 28 from http://www.idquantique.com/random-number-generation/quantis-random-number-generator/. |
17 | NIST, SP800-90B_EntropyAssessment, Retrieved Aug., 28 from https://github.com/usnistgov/SP800-90B_EntropyAssessment. |