Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.4.809

A Study on the Entropy Evaluation Method for Time-Dependent Noise Sources of Windows Operating System and It's Applications  

Kim, Yewon (Dept. of Financial Information Security, Kookmin University)
Yeom, Yongjin (Dept. of Financial Information Security, Kookmin University)
Abstract
The entropy evaluation method for noise sources is one of the evaluation methods for the random number generator that is the essential element of modern cryptographic systems and cryptographic modules. The primary entropy evaluation methods outside of the country are more suitable to apply to hardware noise sources than software noise sources, and there is a difficulty in quantitative evaluation of entropy by software noise source. In this paper, we propose an entropy evaluation method that is suitable for software noise sources, considering characteristics of software noise sources. We select time-dependent noise sources that are software noise sources of Windows OS, and the heuristic analysis and experimental analysis are performed considering the characteristics of each time-dependent noise source. Based on these analyses, we propose an entropy harvest method from the noise source and the min-entropy estimation method as the entropy evaluation method for time-dependent noise sources. We also show how to use our entropy evaluation method in the Conditioning Component described in SP 800-90B of NIST(USA).
Keywords
Software noise source; Entropy evaluation method; Random number generator;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M.S. Turan, E. Barker, J. Kelsey, K.A. McKay, M.L. Baish, and M. Boyle, "Recommendation for the Entropy Sources Used for Random Bit Generation," NIST Special Publication 800-90B, Jan. 2018.
2 Sang Yun Han, Seogchung Seo, Yongjin Yeom, and Yewon Kim, "Entropy Evaluation Algorithms for Noise Sources in Software Environments," TTAK.KO-12.0306/R1, Jun. 2018.
3 Yewon Kim, "A study on the Entropy Analysis for Time-Dependent Noise Sources and the Parallel Implementation of the Randomness Tests," Master's thesis, Kookmin University, Aug. 2017.
4 NIST, "Implementation Guidance for FIPS 140-2 and the Cryptographic Module Validation Program," Jan. 2018.
5 MSDN, "Windows 10 API sets" https://msdn.microsoft.com/en-us/library/windows/desktop/dn764993(v=vs.85).aspx, accessed Aug. 13, 2018.
6 Yewon Kim, Ju-Sung Kang, and Yongjin Yeom, "A study on an estimation method for noise sources related to time of Windows operating system," Conference on Information Security and Cryptography 2016 Winter, Dec. 2016.
7 NIST, "Secure Hash Standard (SHS)," FIPS PUB 180-4, Mar. 2012.
8 W. Killmann and W. Schindler, "A Proposal for : Functionally classes and evaluation methodology for true (physical) random number generators," BSI, Sep. 2001.
9 ISO, "Information technology -- Security techniques -- Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408," ISO/IEC DIS 20543, Jan. 2018.
10 M.S. Turan, E. Barker, J. Kelsey, K.A. McKay, M.L. Baish, and M. Boyle, "Recommendation for the Entropy Sources Used for Random Bit Generation(Second DRAFT)," NIST Special Publication 800-90B, Jan. 2016.