Implementation of TRNG with SHA-3 for hardware security

被引:6
|
作者
Kamadi, Annapurna [1 ]
Abbas, Zia [1 ]
机构
[1] Int Inst Informat Technol IIIT, CVEST, Hyderabad, India
来源
MICROELECTRONICS JOURNAL | 2022年 / 123卷
关键词
RNG; TRNG; PRNG; HRNG; MLFSR; Sponge function; Hash algorithm; Keccak; Cryptography; ILA; FPGA Zed board; NIST; Diehard;
D O I
10.1016/j.mejo.2022.105410
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Random Number Generators (RNGs) are the solution for cryptographic applications to enhance hardware security. These RNGs ought to have three specific properties unpredictability, aperiodic, and good statistical criteria. This brief presents a True Random Number Generator (TRNG) based on Ring oscillators' jitter with MLFSR. The MLFSR is augmented with a set of prime primitive polynomials, Boolean, and non-linear functions to attain a non-linear, unpredictable, and extended sequence period. Paper mainly focused on achieving high randomness by integrated the TRNG with a new promising crypto engine Keccak as a post-processing block; leads to extensively more security in data transfer, encryption keys, data authenticity of ICs, and IoT based applications. The RNG design is coded in Verilog HDL and implemented on the FPGA Zed board. Hashing is performed with a throughput of 2.4Gbps at 100 MHz either with RNG data or SHA data. Evaluated the randomness of the generated non-deterministic bitstreams (10 Mb) using the NIST 800-22 & Diehard test suite and successfully passed.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A New High Throughput and Area Efficient SHA-3 Implementation
    Wong, Ming Ming
    Haj-Yahya, Jawad
    Sau, Suman
    Chattopadhyay, Anupam
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [22] Malicious SHA-3
    Morawiecki, Pawel
    FUNDAMENTA INFORMATICAE, 2019, 169 (04) : 331 - 343
  • [23] Enhancing the Hardware Pipelining Optimization Technique of the SHA-3 via FPGA
    Sideris, Argyrios
    Dasygenis, Minas
    COMPUTATION, 2023, 11 (08)
  • [24] Improving security of lightweith SHA-3 against preimage attacks
    Onopa, Serhii
    Kotulski, Zbigniew
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2018, 64 (02) : 159 - 166
  • [25] An efficient hardware implementation of SHA-3 using 3D cellular automata for secure wireless sensor networks
    Zied Guitouni
    Noeman Ammar
    Mohsen Machhout
    International Journal of Information Security, 2025, 24 (3)
  • [26] Hardware Performance Evaluation of SHA-3 Finalists - Blake, Keccak and Skein
    Latif, K.
    Aziz, A.
    Mahboob, A.
    ARAB GULF JOURNAL OF SCIENTIFIC RESEARCH, 2012, 30 (01): : 14 - 22
  • [27] High Throughput Design and Implementation of SHA-3 Hash Algorithm
    Wu, Xufan
    Li, Shuguo
    2017 INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS (EDSSC), 2017,
  • [28] Towards to SHA-3 Hashing Standard for Secure Communications: On the Hardware Evaluation Development
    Sklavos, N.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (01) : 1433 - 1434
  • [29] On the Implementation of McEliece with CCA2 Indeterminacy by SHA-3
    Ghosh, Santosh
    2014 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2014, : 2804 - 2807
  • [30] SHA-3-LPHP: Hardware Acceleration of SHA-3 for Low-Power High-Performance Systems
    Akiya, Yuta
    Le, Kyle Thomas
    Luong, Megan
    Wilson, Justin C.
    Eddin, Anas Salah
    Formicola, Valerio
    El-Hadedy, Mohamed
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 393 - 398