Designing a Side Channel Resistant Random Number Generator

نویسندگان

  • Suresh Chari
  • Vincenzo V. Diluoffo
  • Paul A. Karger
  • Elaine R. Palmer
  • Tal Rabin
  • Josyula R. Rao
  • Pankaj Rohatgi
  • Helmut Scherzer
  • Michael Steiner
  • David C. Toll
چکیده

This paper describes the design of the random number generator (RNG) in the Caernarvon high assurance smart card operating system. Since it is used in the generation of cryptographic keys and other sensitive materials, the RNG has a number of stringent security requirements that the random bits must be of good quality i.e. the bits must not be predictable or biased. To this end, a number of standards such as the German AIS 31 mandate that true random bits be continuously tested before use in sensitive applications such as key generation. A key issue in implementing this standard is that such testing before use in key generation greatly increases the attack surface for side-channel attacks. For example, template attacks which can extract information about the random bits from even a single run provided we use the same bits at many different points in the computation. Because of these potential risks, the Caernarvon operating system uses pseudo random number generators which are initially seeded by externally generated high quality random bits, and then perturbed by bits from the true random number generator. We describe a PRNG design which yields high quality random bits while also ensuring that it is not susceptible to side-channel attacks and provide an informal argument about its effectiveness.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Nano-Intrinsic True Random Number Generation

Recent advances in predictive data analytics and ever growing digitalization and connectivity with explosive expansions in industrial and consumer Internet-of-Things (IoT) has raised significant concerns about security of people’s identities and data. It has created close to ideal environment for adversaries in terms of the amount of data that could be used for modeling and also greater accessi...

متن کامل

EM radiation analysis on True Random Number Generators: Frequency and localization retrieval method

True random number generators (TRNGs) are significant piece of hardware security that are used to generate secret keys, initial values or random masks for counter measures against side-channel attacks. Thus the security of implementation in hardware of such block is crucial. The work presented in this paper show that it is possible to find information on a TRNG using its electromagnetic radiati...

متن کامل

A Closer Look at Security in Random Number Generators Design

The issue of random number generation is crucial for the implementation of cryptographic systems. Random numbers are often used in key generation processes, authentication protocols, zeroknowledge protocols, padding, in many digital signature and encryption schemes, and even in some side channel attack countermeasures. For these applications, security depends to a great extent on the quality of...

متن کامل

Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks

A pseudo-random number generator (PRNG) is a deterministic algorithm that produces numbers whose distribution is indistinguishable from uniform. In this paper, we extend the formal model of PRNG with input defined by Dodis et al. at CCS 2013 to deal with partial leakage of sensitive information. The resulting security notion, termed leakage-resilient robust PRNG with input, encompasses all the ...

متن کامل

Stealthy Dopant-Level Hardware Trojans

With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010