Generating Random Numbers in Hostile Environments

نویسندگان

  • Jan Krhovjak
  • Andriy Stetsko
  • Vashek Matyas
چکیده

This paper discusses basic security aspects of distributed random number generation in potentially hostile environments. The goal is to outline and discuss a distributed approach, which comes to question in the case of attacker being able to target one or several mobile devices. We define communication paths and attacker models instead of providing technical details of local generation. This paper also includes a discussion of several issues of such distributed approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RANDOMNESS IN INTEGRATED CIRCUITS WITH APPLICATIONS IN DEVICE IDENTIFICATION AND RANDOM NUMBER GENERATION A Thesis Presented by

RANDOMNESS IN INTEGRATED CIRCUITS WITH APPLICATIONS IN DEVICE IDENTIFICATION AND RANDOM NUMBER GENERATION AUGUST 2007 DANIEL E. HOLCOMB B.S., UNIVERSITY OF MASSACHUSETTS AMHERST M.S.E.C.E., UNIVERSITY OF MASSACHUSETTS AMHERST Directed by: Professor Wayne P. Burleson RFID applications create a need for low-cost security and privacy in potentially hostile environments. To support security and pri...

متن کامل

A PRELUDE TO THE THEORY OF RANDOM WALKS IN RANDOM ENVIRONMENTS

A random walk on a lattice is one of the most fundamental models in probability theory. When the random walk is inhomogenous and its inhomogeniety comes from an ergodic stationary process, the walk is called a random walk in a random environment (RWRE). The basic questions such as the law of large numbers (LLN), the central limit theorem (CLT), and the large deviation principle (LDP) are ...

متن کامل

An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments

As virtual machines become increasingly commonplace as a method of separating hostile or hazardous code from commodity systems, the potential security exposure from implementation flaws has increased dramatically. This paper investigates the state of popular virtual machine implementations for x86 systems, employing a combination of source code auditing and blackbox random testing to assess the...

متن کامل

Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags

RFID applications create a need for low-cost security and privacy in potentially hostile environments. Our measurements show that initialization of SRAM produces a physical fingerprint. We propose a system of Fingerprint Extraction and Random Numbers in SRAM (FERNS) that harvests static identity and randomness from existing volatile CMOS storage. The identity results from manufacture-time physi...

متن کامل

RANDOM FUZZY SETS: A MATHEMATICAL TOOL TO DEVELOP STATISTICAL FUZZY DATA ANALYSIS

Data obtained in association with many real-life random experiments from different fields cannot be perfectly/exactly quantified.hspace{.1cm}Often the underlying imprecision can be suitably described in terms of fuzzy numbers/\values. For these random experiments, the scale of fuzzy numbers/values enables to capture more variability and subjectivity than that of categorical data, and more accur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008