[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <877g73ofj5.fsf@wolfjaw.dfranke.us>
Date: Sat, 05 Apr 2014 13:24:46 -0400
From: Daniel Franke <dfoxfranke@...il.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] Re: Mechanical tests
Peter Maxwell <peter@...icient.co.uk> writes:
> On 5 April 2014 16:41, Daniel Franke <dfoxfranke@...il.com> wrote:
>
> "Poul-Henning Kamp" <phk@....freebsd.dk> writes:
>
> > Dieharder looks for bits which do not carry one full bit of
> entropy,
> > whivh is important if you are in the market for random-looking
> bits.
> >
> > We are not, we are in the business of making sure that entropy
> is
> > not lost, and we do not care if an algorithm spits out 100 bits
> > with full entropy or 1000 bits each with only 1/10th bit of
> entropy.
>
> Some of the PHC candidates claim to be key derivation functions.
> In
> those cases we most assuredly do care about this. It would mean
> that the
> effective length of your derived key is only a 1/10 what you
> thought it
> was.
>
>
> No, PHK's definition was, probably provably, correct (for password
> hash or key derivation), assuming the *full* output is being used.
The definition of weakly-secure KDF, given in
http://palms.ee.princeton.edu/PALMSopen/yao05design.pdf requires the
adversary to distinguish the output of the KDF from uniformly-random
output of equal length. In the case where the KDF's output is 1000 bits
long with each bit carrying 1/10th bit of entropy, the adversary can,
with high probability, win this game in a single query just by counting
Hamming weight.
In terms of practical rather than mathematical security, "assuming the
*full* output is being used" is unreasonable. If a function is sold to
me as a KDF, I expect to safely be able to destructure its output in
order to derive multiple keys from a single invocation.
Powered by blists - more mailing lists