Generating Random Numbers in Hostile Environments
نویسندگان
چکیده
This paper discusses basic security aspects of distributed random number generation in potentially hostile environments. The goal is to outline and discuss a distributed approach, which comes to question in the case of attacker being able to target one or several mobile devices. We define communication paths and attacker models instead of providing technical details of local generation. This paper also includes a discussion of several issues of such distributed approach.
منابع مشابه
RANDOMNESS IN INTEGRATED CIRCUITS WITH APPLICATIONS IN DEVICE IDENTIFICATION AND RANDOM NUMBER GENERATION A Thesis Presented by
RANDOMNESS IN INTEGRATED CIRCUITS WITH APPLICATIONS IN DEVICE IDENTIFICATION AND RANDOM NUMBER GENERATION AUGUST 2007 DANIEL E. HOLCOMB B.S., UNIVERSITY OF MASSACHUSETTS AMHERST M.S.E.C.E., UNIVERSITY OF MASSACHUSETTS AMHERST Directed by: Professor Wayne P. Burleson RFID applications create a need for low-cost security and privacy in potentially hostile environments. To support security and pri...
متن کاملA PRELUDE TO THE THEORY OF RANDOM WALKS IN RANDOM ENVIRONMENTS
A random walk on a lattice is one of the most fundamental models in probability theory. When the random walk is inhomogenous and its inhomogeniety comes from an ergodic stationary process, the walk is called a random walk in a random environment (RWRE). The basic questions such as the law of large numbers (LLN), the central limit theorem (CLT), and the large deviation principle (LDP) are ...
متن کاملAn Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments
As virtual machines become increasingly commonplace as a method of separating hostile or hazardous code from commodity systems, the potential security exposure from implementation flaws has increased dramatically. This paper investigates the state of popular virtual machine implementations for x86 systems, employing a combination of source code auditing and blackbox random testing to assess the...
متن کاملInitial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags
RFID applications create a need for low-cost security and privacy in potentially hostile environments. Our measurements show that initialization of SRAM produces a physical fingerprint. We propose a system of Fingerprint Extraction and Random Numbers in SRAM (FERNS) that harvests static identity and randomness from existing volatile CMOS storage. The identity results from manufacture-time physi...
متن کاملRANDOM FUZZY SETS: A MATHEMATICAL TOOL TO DEVELOP STATISTICAL FUZZY DATA ANALYSIS
Data obtained in association with many real-life random experiments from different fields cannot be perfectly/exactly quantified.hspace{.1cm}Often the underlying imprecision can be suitably described in terms of fuzzy numbers/\values. For these random experiments, the scale of fuzzy numbers/values enables to capture more variability and subjectivity than that of categorical data, and more accur...
متن کامل