Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.3.449

Cryptographic Analysis of the Post-Processing Procedure in the Quantum Random Number Generator Quantis  

Bae, Minyoung (Dept. of Financial Information Security, Kookmin University)
Kang, Ju-Sung (Dept. of Financial Information Security, Kookmin University)
Yeom, Yongjin (Dept. of Financial Information Security, Kookmin University)
Abstract
In this paper, we analyze the security and performance of the Quantis Quantum random number generator in terms of cryptography through experiments. The Quantis' post-processing is designed to output full-entropy via bit-matrix-vector multiplication based on mathematical background, and we used the min-entropy estimating test of NIST SP 800-90B so as to verify whether the output is full-entropy. Quantis minimizes the effect on the random bit rate by using an optimization technique for bit-matrix-vector multiplication, and compared the performance to conditioning functions of NIST SP 800-90B by measuring the random bit rate. Also, we have distinguished what is in Quantis' post-processing to the standard model of NIST in USA and BSI in Germany, and in case of applying Quantis to cryptographic systems in accordance with the CMVP standard, it is recommended to use the output of Quantis as the seed of the approved DRBG.
Keywords
Quantum random number generator; Post-processing; Conditioning; 2-universal hashing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "Information technology - Security techniques - Random bit generation," ISO/IEC 18031, Nov. 2011.
2 W. Killmann and W. Schindler, "A proposal for: Functionality classes for random number generators," BSI AIS 20 / AIS 31, Sep. 2011.
3 E. Barker and J. Kelsey, "Recommendation for the Entropy Sources Used for Random Bit Generation," NIST SP 800-90B, Aug. 2012.
4 M.S. Turan, E. Barker, J. Kelsey, K.A. McKay, M.L. Baish and M. Boyle, "Recommendation for the Entropy Sources Used for Random Bit Generation," NIST SP 800-90B(second DRAFT), Jan. 2016.
5 ID Quantique SA, ID Quantique White Paper - Random Number Generation using Quantum Physics, ID Quantique SA, Apr. 2010.
6 ID Quantique SA, ID Quantique White Paper - Randomness Extraction for the Quantis True Random Number Generation, ID Quantique SA, Sep. 2012.
7 M. Troyer and R. Renner, ID Quantique Technical Paper on Randomness Extractor - A randomness extractor for the Quantis device, ID Quantique SA, Sep. 2012.
8 R. Impagliazzo, L.A. Levin, and M. Luby. "Pseudo-random generation from one-way functions (extended abstract)." In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, May 1989.
9 ID Quantique SA, Quantis Certifications, ID Quantique SA, Apr. 2016.
10 D. Frauchiger, R. Renner, and M. Troyer, "True randomness from realistic quantum devices," arXiv preprint arXiv:1311.4547v1, Nov. 2013.
11 NIST, "The Keyed-Hash Message Authentication Code (HMAC)," FIPS PUB 198-1, Jul. 2008.
12 M. Dworkin, "Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication," NIST SP 800-38B, May 2005.
13 E. Barker and J. Kelsey, "Recommendation for Random Number Generation Using Deterministic Random Bit Generators," NIST SP 800-90A (Revision 1), Jun. 2015.
14 NIST, "Secure Hash Standard (SHS)," FIPS PUB 180-4, Mar. 2012.
15 NIST, "Advanced Encryption Standard (AES)," FIPS PUB 197, Nov. 2001.
16 NIST, "Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program," FIPS PUB 140-2 IG, Jun. 2017.