In this presentation I talk primarily about backdoors by going into to the details of Dual EC DRBG works and the underline math behind it. I then discuss the difficulty of detecting such backdoors, its effects on trust.
are the consequences of seed being predictable? 3. Where does the security of PRNGs lie in? 4. How do we generate “true random” values for the seed? a. How do modern systems compute “true random” values? 5. Why not generate the key using a TRNG? 6. Properties of PRNGs a. How can these features be useful? 7. Assumption that forms the basis of our model for security 8. How is the key sent over the same insecure channel?
physical sources such as temperature, thermal noise etc. that are known to produce non-predictable outputs. Hence, they are called True Random Number Generators.
in 2006 P, Q → Points on an EC S 0 → Seed S 2 → Updated seed 1. Operation: S i * P is computationally hard to reverse, similar to large integer multiplication 2. Security model: P, Q should be generated independently
to behave according to a norm, imposing sanctions to those who do not, more than the system itself.” Reference: There’s no good reason to trust blockchain technology Who do we trust then?