Self-timed Ring based True Random Number Generator: Threat model and countermeasures - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2017

Self-timed Ring based True Random Number Generator: Threat model and countermeasures

Résumé

Self-timed Ring based True Random Generators (STRNGs) extract randomness from the jitter of events evenly propagating in a Self-Timed Ring (STR) oscillator. Security of such generators is primarily based on an entropy assessment: an accurate model of the minimum entropy per output bit with physical measurement of the noise source. This assessment is reinforced with both entropy source monitoring and online testing of the output bits. This paper addresses the security of the STRNG. First we identify potential vulnerabilities on the generator and define a threat model. Based on this threat model, we analyze the effect of active attacks in analog simulations (in a 55 nm technology), and by emulating them in a high-level simulation model. Then, we propose simple and efficient countermeasures to thwart attacks focusing on the generator. Finally, we evaluate the output sequences before and after attacks to validate the proposed countermeasures.
Fichier non déposé

Dates et versions

hal-01627350 , version 1 (01-11-2017)

Identifiants

Citer

Grégoire Gimenez, Abdelkarim Cherkaoui, Raphael Frisch, Laurent Fesquet. Self-timed Ring based True Random Number Generator: Threat model and countermeasures. IEEE 2nd International Verification and Security Workshop (IVSW), Jul 2017, Thessaloniki, Greece. pp.31-38, ⟨10.1109/IVSW.2017.8031541⟩. ⟨hal-01627350⟩

Collections

UGA CNRS TIMA
142 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More