Implementation of TRNG with SHA-3 for hardware security

被引:6
|
作者
Kamadi, Annapurna [1 ]
Abbas, Zia [1 ]
机构
[1] Int Inst Informat Technol IIIT, CVEST, Hyderabad, India
来源
MICROELECTRONICS JOURNAL | 2022年 / 123卷
关键词
RNG; TRNG; PRNG; HRNG; MLFSR; Sponge function; Hash algorithm; Keccak; Cryptography; ILA; FPGA Zed board; NIST; Diehard;
D O I
10.1016/j.mejo.2022.105410
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Random Number Generators (RNGs) are the solution for cryptographic applications to enhance hardware security. These RNGs ought to have three specific properties unpredictability, aperiodic, and good statistical criteria. This brief presents a True Random Number Generator (TRNG) based on Ring oscillators' jitter with MLFSR. The MLFSR is augmented with a set of prime primitive polynomials, Boolean, and non-linear functions to attain a non-linear, unpredictable, and extended sequence period. Paper mainly focused on achieving high randomness by integrated the TRNG with a new promising crypto engine Keccak as a post-processing block; leads to extensively more security in data transfer, encryption keys, data authenticity of ICs, and IoT based applications. The RNG design is coded in Verilog HDL and implemented on the FPGA Zed board. Hashing is performed with a throughput of 2.4Gbps at 100 MHz either with RNG data or SHA data. Evaluated the randomness of the generated non-deterministic bitstreams (10 Mb) using the NIST 800-22 & Diehard test suite and successfully passed.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Compact Hardware Implementation of SHA-3 Finalist Blake on FPGA
    Arsalan, Muhammad
    Ata-ur-Rehman, Muhammad
    Mehmood, Nasir
    Aziz, Arshad
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET 2013), 2013, : 245 - 249
  • [2] Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks
    Yang, Yi
    He, Debiao
    Kumar, Neeraj
    Zeadally, Sherali
    IEEE ACCESS, 2018, 6 : 40128 - 40136
  • [3] Implementation of Security features in MANETs using SHA-3 Standard Algorithm
    Dilli, Ravilla
    Reddy, Putta Chandra Sekhar
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 455 - 458
  • [4] Efficient Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist - Skein
    Latif, Kashif
    Tariq, Muhammad
    Aziz, Arshad
    Mahboob, Athar
    FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 933 - 940
  • [5] Hardware Implementation of A SHA-3 Application-Specific Instruction Set Processor
    Elmohr, Mahmoud A.
    Saleh, Mostafa A.
    Eissa, Ahmed S.
    Ahmed, Khaled E.
    Farag, Mohammed M.
    2016 28TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM 2016), 2016, : 109 - 112
  • [6] Fast Implementation of SHA-3 in GPU Environment
    Choi, Hojin
    Seo, Seog Chung
    IEEE ACCESS, 2021, 9 : 144574 - 144586
  • [7] Developing a Hardware Evaluation Method for SHA-3 Candidates
    Henzen, Luca
    Gendotti, Pietro
    Guillet, Patrice
    Pargaetzi, Enrico
    Zoller, Martin
    Guerkaynak, Frank K.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 248 - +
  • [8] Advancing Cryptographic Security: A Study on SHA-3 Implementation within CRYSTAL-KYBER Key-Encapsulation Mechanism Hardware
    Minh Mai Hoang
    Trang Hoang
    2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 131 - 136
  • [9] Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID
    Pessl, Peter
    Hutter, Michael
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 126 - 141
  • [10] An FPGA implementation of the SHA-3: The BLAKE Hash Function
    Kahri, Fatma
    Bouallegue, Belgacem
    Machhout, Mohsen
    Tourki, Rached
    2013 10TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2013,