首页> 外文会议>International Conference on Signals and Electronic Systems >A true random number generator using ring oscillators and SHA-256 as post-processing
【24h】

A true random number generator using ring oscillators and SHA-256 as post-processing

机译:使用环形振荡器和SHA-256作为后处理的真正随机数生成器

获取原文

摘要

In cryptography, we often require sequences of numbers with unpredictable elements. Such sequences have to pass all known statistical tests for random sequences, e.g. NIST 800-22 test suite, Diehard, TestU01 or UC1. To hamper different attacks, random number generators should be implemented in the same chip as a cryptographic system using random numbers. It forces a designer to create a true random number generator purely digitally. The obtained sequences are biased and do not pass many statistical tests. Therefore an output of the random number generator should be subjected to a transformation called post-processing. In this paper a true random number generator consisted of several uniformly sampled ring oscillators and using hash function SHA-256 as post-processing, is presented. Both components are implemented in a single Field Programmable Gate Array (FPGA). We expect that the proposed solution, implemented in the same FPGA together with a cryptographic system, is more attack-resistant owing to many sources of randomness with significantly different nominal frequencies.
机译:在密码学中,我们经常需要带有不可预测元素的数字序列。此类序列必须通过所有已知的随机序列的统计检验,例如随机序列。 NIST 800-22测试套件,Diehard,TestU01或UC1。为了阻止不同的攻击,随机数生成器应与使用随机数的密码系统在同一芯片中实现。它迫使设计人员纯粹以数字方式创建一个真正的随机数生成器。所获得的序列是有偏见的,没有通过许多统计检验。因此,应该对随机数生成器的输出进行称为后处理的转换。本文提出了一个真正的随机数发生器,它由几个均匀采样的环形振荡器组成,并使用哈希函数SHA-256作为后处理。这两个组件都在单个现场可编程门阵列(FPGA)中实现。我们希望,由于许多随机源具有不同的标称频率,因此在同一FPGA中与加密系统一起实施的拟议解决方案具有更高的抗攻击性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号