Randomness Tests in Hostile Environments

被引:1
作者
Goll, Martin [1 ]
Gueron, Shay [2 ,3 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] Univ Haifa, Dept Math, Haifa, Israel
[3] Intel Corp, Israel Dev Ctr, Haifa, Israel
关键词
Error-checking; random number generation; statistical computing; testing strategies;
D O I
10.1109/TDSC.2016.2537799
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An acceptable way to assess the quality of an RNG(PRNG) is to apply a standard battery of statistical randomness tests to a sampled output. Such tests compare some observed properties of the sample to properties of a uniform distribution, with the hope to detect deviations from the expected behavior. Consider a (P) RNG that outputs M-bit values which, due to a failure or an attack, are coerced to a subset of {0, 1}(M) of only 2(n) elements, for some n < M. Such outputs are predictable with a probability of at least 2(-n) > 2(-M), but the standard randomness tests do not necessarily detect this behavior. We show here deterministic M-bit sequences (M = 128) that belong to a subset of size 2 n, but pass the DIEHARD Battery of Tests of Randomness [1] and the NIST Statistical Test Suite [2], even with a relatively small value of n = 29. To address the difficulty, we propose a detection method that is feasible even for large values of n (e.g., n = 64). As a practical example, we apply our method to rule out the existence of the speculative stealthy hardware Trojan that is discussed in [3].
引用
收藏
页码:289 / 294
页数:6
相关论文
共 9 条
[1]  
Ahmed S. E., 2000, CRUX MATHEMATICORUM, V26, P151
[2]  
[Anonymous], 2014, DIG RAND NUMB GEN DR
[3]  
Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
[4]  
Gustafson H. M., 1995, P INT C CRYPT POL AL, P132
[5]  
Hamburg M., 2012, Analysis of Intel's Ivy Bridge digital random number generator
[6]  
Marsaglia G, 2008, The Marsaglia random number CDROM including the diehard battery of tests of randomnessJ
[7]  
NIST, 2010, STAT TEST SUIT RAND
[8]   Reversing stealthy dopant-level circuits [J].
Sugawara, Takeshi ;
Suzuki, Daisuke ;
Fujii, Ryoichi ;
Tawa, Shigeaki ;
Hori, Ryohei ;
Shiozaki, Mitsuru ;
Fujino, Takeshi .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 :112-126
[9]  
Walker J., 2012, ISTS COMP SCI DEP C