[go: up one dir, main page]

13 Feb 26

For our 6.5610 (Applied Cryptography) final project, we present an backdoorable DRBG based on Dual EC DRBG that, unlike Dual EC DRBG, is a true DRBG under suitable assumptions. Our algorithm, which we call the Twisted Dual EC DRBG, involves iteratively multiplying points on an elliptic curve or its quadratic twist.

The introduction contains background on how the NSA and NIST initially worked to backdoor a DRBG; LOL.

by kawcco 10 days ago