Key Words:Provable security, Random number generator
Abstract:We study the security of CTR-DRBG, one of NIST’s recom mended Pseudorandom Number Generator (PRNG) designs. Recently, Woodage and Shumow(Eurocrypt’ 19), and then Cohney et al. (S&P’ 20) point out some potential vulnerabilities in both NIST specification and common implementations of CTR-DRBG. While these researchers do suggest counter-measures, the security of the patched CTR-DRBG is still questionable. Our work fills this gap, proving that CTR-DRBG satisfies the robustness notion of Dodis et al. (CCS’13), the standard security goal for PRNGs.