Implementation of TRNG with SHA-3 for hardware security

被引:6
|
作者
Kamadi, Annapurna [1 ]
Abbas, Zia [1 ]
机构
[1] Int Inst Informat Technol IIIT, CVEST, Hyderabad, India
来源
MICROELECTRONICS JOURNAL | 2022年 / 123卷
关键词
RNG; TRNG; PRNG; HRNG; MLFSR; Sponge function; Hash algorithm; Keccak; Cryptography; ILA; FPGA Zed board; NIST; Diehard;
D O I
10.1016/j.mejo.2022.105410
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Random Number Generators (RNGs) are the solution for cryptographic applications to enhance hardware security. These RNGs ought to have three specific properties unpredictability, aperiodic, and good statistical criteria. This brief presents a True Random Number Generator (TRNG) based on Ring oscillators' jitter with MLFSR. The MLFSR is augmented with a set of prime primitive polynomials, Boolean, and non-linear functions to attain a non-linear, unpredictable, and extended sequence period. Paper mainly focused on achieving high randomness by integrated the TRNG with a new promising crypto engine Keccak as a post-processing block; leads to extensively more security in data transfer, encryption keys, data authenticity of ICs, and IoT based applications. The RNG design is coded in Verilog HDL and implemented on the FPGA Zed board. Hashing is performed with a throughput of 2.4Gbps at 100 MHz either with RNG data or SHA data. Evaluated the randomness of the generated non-deterministic bitstreams (10 Mb) using the NIST 800-22 & Diehard test suite and successfully passed.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] A complete SHA-3 hardware library based on a high efficiency Keccak design
    Camacho-Ruiz, Eros
    Sanchez-Solano, Santiago
    Martinez-Rodriguez, Macarena C.
    Brox, Piedad
    2023 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE, NORCAS, 2023,
  • [32] High Performance Pipelined FPGA Implementation of the SHA-3 Hash Algorithm
    Ioannou, Lenos
    Michail, Harris E.
    Voyiatzis, Artemios G.
    2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 68 - 71
  • [33] Implementation of SHA-3 Candidate Skein on Two Unexplored Multiprocessor Platforms
    Malik, Aisha
    Aziz, Arshad
    Qadeer, Abdul
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 193 - 196
  • [34] Hardware acceleration design of the SHA-3 for high throughput and low area on FPGA
    Sideris, Argyrios
    Sanida, Theodora
    Dasygenis, Minas
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (02) : 193 - 205
  • [35] Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates
    Knezevic, Miroslav
    Kobayashi, Kazuyuki
    Ikegami, Jun
    Matsuo, Shin'ichiro
    Satoh, Akashi
    Kocabas, Uenal
    Fan, Junfeng
    Katashita, Toshihiro
    Sugawara, Takeshi
    Sakiyama, Kazuo
    Verbauwhede, Ingrid
    Ohta, Kazuo
    Homma, Naofumi
    Aoki, Takafumi
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (05) : 827 - 840
  • [36] Verifying the SHA-3 Implementation from OpenSSL with the Software Analysis Workbench
    Hanson, Parker
    Winters, Benjamin
    Mercer, Eric
    Decker, Brett
    MODEL CHECKING SOFTWARE, SPIN 2022, 2022, 13255 : 97 - 113
  • [37] The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3
    Longa, Patrick
    Wang, Wen
    Szefer, Jakub
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 402 - 431
  • [38] An efficient hardware implementation of SHA-3 using 3D cellular automata for secure blockchain-based IoT systems
    Guitouni, Zied
    Ammar, Noeman
    Machhout, Mohsen
    ENGINEERING RESEARCH EXPRESS, 2024, 6 (04):
  • [39] Differential Fault Analysis of SHA-3
    Bagheri, Nasour
    Ghaedi, Navid
    Sanadhya, Somitra Kumar
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 9462 : 253 - 269
  • [40] Hardware authentication based on PUFs and SHA-3 2nd round candidates
    Eiroa, Susana
    Baturone, Iluminada
    2010 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, 2010, : 319 - 322