Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks
dc.contributor.author | Bahrami, Javad | |
dc.contributor.author | Danger, Jean-Luc | |
dc.contributor.author | Ebrahimabadi, Mohammad | |
dc.contributor.author | Guilley, Sylvain | |
dc.contributor.author | Karimi, Naghmeh | |
dc.date.accessioned | 2023-08-21T22:34:42Z | |
dc.date.available | 2023-08-21T22:34:42Z | |
dc.date.issued | 2023-09 | |
dc.description.abstract | True Random Number Generators (TRNGs) are sensitive Intellectual Property (IP) blocks involved in the creation of cryptographic keys, initialization vectors, nonces, etc. They must behave properly within a large environmental spectrum, including multiple corners, in case of aging-induced change of device characteristics over time, and also under intentional attacks aiming at lowering the TRNGs entropy. In this paper, we review normative and technical landscapes in this respect, and propose a pre-silicon verification methodology to assess the resilience of TRNGs. In particular, we qualify the unitary free running oscillator (FRO) entropy source analytically, and then extend the study to a full FRO-based IP module. Our results encompass analytical characterizations in terms of jitter measurements and certification-based characterizations in terms of tests. | en_US |
dc.description.sponsorship | This work has partly benefited from the bilateral MESRIBMBF project “APRIORI” from the ANR cybersecurity 2020 call (Project ANR 20-CYAL-0007). Besides, the authors acknowledge financial support of the French National Bank (BPI) under SECURYZR-V grant (Contract n◦ DOS0144216/00), a RISC-V centric platform integrating security co-processors. | en_US |
dc.description.uri | https://www.researchgate.net/publication/372750765_Challenges_in_Generating_True_Random_Numbers_Considering_the_Variety_of_Corners_Aging_and_Intentional_Attacks | en_US |
dc.format.extent | 7 pages | en_US |
dc.genre | journal articles | en_US |
dc.genre | preprints | en_US |
dc.identifier | doi:10.13016/m2vrom-hcv5 | |
dc.identifier.uri | http://hdl.handle.net/11603/29304 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | en_US |
dc.title | Challenges in Generating True Random Numbers Considering the Variety of Corners, Aging, and Intentional Attacks | en_US |
dc.type | Text | en_US |
dcterms.creator | https://orcid.org/0000-0002-5825-6637 | en_US |