A security analysis of a deterministic key generation scheme
Publication Type
Conference Proceeding Article
Publication Date
9-2024
Abstract
A deterministic key generation scheme is an encryption method that derives a secret key using a fixed seed and algorithm, ensuring consistent production of the same secret key for identical inputs. This approach streamlines key management by eliminating the need for separate key storage and enables straightforward backup and recovery through the use of a seed or master key. Nevertheless, it introduces security risks, particularly if the key is compromised. Therefore, safeguarding the initial seed or master key is paramount for upholding the security of the entire key hierarchy. In this paper, we rigorously describe a novel method for generating deterministic RSA keys from ECDSA signatures employing a Pseudo-Random Number Generator (PRNG). Subsequently, we conduct a comprehensive security analysis of this approach, demonstrating the security and collision resistance of the RSA keys generated.
Keywords
Resistance, Ciphers, Production, Generators, Encryption, Security, Reliability
Discipline
Databases and Information Systems | Information Security
Research Areas
Data Science and Engineering; Cybersecurity
Publication
Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR 2024) : London, UK, September 2-4
First Page
309
Last Page
314
ISBN
9798350375374
Identifier
10.1109/CSR61664.2024.10679483
Publisher
IEEE
City or Country
London, UK
Citation
SONG, Yuhao; YAN, Yuping; SHAO, George; ZHU, Feida; and SONG, Mason.
A security analysis of a deterministic key generation scheme. (2024). Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR 2024) : London, UK, September 2-4. 309-314.
Available at: https://ink.library.smu.edu.sg/sis_research/9792
Additional URL
https://doi.org/10.1109/CSR61664.2024.10679483