Skip to main content
Top

2018 | OriginalPaper | Chapter

The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party

Author : John Kelsey

Published in: Security Standardisation Research

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We discuss the development of a new format for beacons–servers which provide a sequence of digitally signed and hash-chained public random numbers on a fixed schedule. Users of beacons rely on the trustworthiness of the beacon operators. We consider several possible attacks on the users by the beacon operators, and discuss defenses against those attacks that have been incorporated into the new beacon format. We then analyze and quantify the effectiveness of those defenses.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
There are other ways to get public random numbers. Many also depend on some trusted third party; others introduce other practical problems–ambiguity about correct values, lack of a fixed schedule, etc. Overall, we believe beacons are the best way to get practical public randomness for real-world applications.
 
2
The localRandomValue is the locally-produced random value, but the actual random value of the pulse is outputValue–this is what almost any application should use, as discussed below.
 
3
It’s possible for a beacon to suffer an outage, during which scheduled pulses are not produced. Gaps in a sequence of pulses are reflected in the statusCode of the first pulse produced immediately following an outage.
 
4
The use of brand or company names does not imply any endorsement on the part of NIST; they are included only to clearly explain how the NIST beacon operates at present.
 
5
While these are not the only possible ways for a beacon to misbehave, they are the ways that undermine the security guarantees of a beacon service.
 
6
There must be some lag time between when the random value is generated and when the pulse is output, since the beacon engine must sign its pulse, compute outputValue, and propagate the pulse to the frontend.
 
7
That system is doing password cracking attacks. Trying to control some bits of the output of the beacon is very similar to password cracking.
 
8
This might be an outsider who has compromised the beacon engine, or an insider with access to the engine but not the HSM or RSA keys.
 
9
A skiplist [3] is a data structure for efficiently accessing and maintaining sorted records; the data structure in this section is a cryptographic one using a hash function, which is based loosely on the original skiplist. A hash skiplist bears the same relationship to a skiplist as a Merkle tree does to an ordinary binary tree.
 
Literature
1.
go back to reference 8x Nvidia GTX 1080 Hashcat Benchmarks. Accessed 09 July 2018 8x Nvidia GTX 1080 Hashcat Benchmarks. Accessed 09 July 2018
2.
go back to reference Biryukov, A., Dinu, D., Khovratovich, D.: Argon2: new generation of memory-hard functions for password hashing and other applications. In: IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, 21–24 March 2016, pp. 292–302 (2016). https://doi.org/10.1109/EuroSP.2016.31 Biryukov, A., Dinu, D., Khovratovich, D.: Argon2: new generation of memory-hard functions for password hashing and other applications. In: IEEE European Symposium on Security and Privacy, EuroS&P 2016, Saarbrücken, Germany, 21–24 March 2016, pp. 292–302 (2016). https://​doi.​org/​10.​1109/​EuroSP.​2016.​31
6.
go back to reference Mell, P., Kelsey, J., Shook, J.M.: Cryptocurrency smart contracts for distributed consensus of public randomness. In: Stabilization, Safety, and Security of Distributed Systems - 19th International Symposium, SSS 2017, Boston, MA, USA, 5–8 November 2017, pp. 410–425 (2017). https://doi.org/10.1007/978-3-319-69084-1_31 Mell, P., Kelsey, J., Shook, J.M.: Cryptocurrency smart contracts for distributed consensus of public randomness. In: Stabilization, Safety, and Security of Distributed Systems - 19th International Symposium, SSS 2017, Boston, MA, USA, 5–8 November 2017, pp. 410–425 (2017). https://​doi.​org/​10.​1007/​978-3-319-69084-1_​31
12.
go back to reference Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock Puzzles and Timed-release Crypto. Technical report Cambridge, MA, USA (1996) Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock Puzzles and Timed-release Crypto. Technical report Cambridge, MA, USA (1996)
13.
go back to reference Schelling, T.C.: The Strategy of Conflict. Oxford University Press, Oxford (1960)MATH Schelling, T.C.: The Strategy of Conflict. Oxford University Press, Oxford (1960)MATH
16.
go back to reference Szabo, N.: Trusted Third Parties are Security Holes (2001). Accessed 09 July 2018 Szabo, N.: Trusted Third Parties are Security Holes (2001). Accessed 09 July 2018
Metadata
Title
The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party
Author
John Kelsey
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-04762-7_9

Premium Partner