Implementation of TRNG with SHA-3 for hardware security

被引:6
|
作者
Kamadi, Annapurna [1 ]
Abbas, Zia [1 ]
机构
[1] Int Inst Informat Technol IIIT, CVEST, Hyderabad, India
来源
MICROELECTRONICS JOURNAL | 2022年 / 123卷
关键词
RNG; TRNG; PRNG; HRNG; MLFSR; Sponge function; Hash algorithm; Keccak; Cryptography; ILA; FPGA Zed board; NIST; Diehard;
D O I
10.1016/j.mejo.2022.105410
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Random Number Generators (RNGs) are the solution for cryptographic applications to enhance hardware security. These RNGs ought to have three specific properties unpredictability, aperiodic, and good statistical criteria. This brief presents a True Random Number Generator (TRNG) based on Ring oscillators' jitter with MLFSR. The MLFSR is augmented with a set of prime primitive polynomials, Boolean, and non-linear functions to attain a non-linear, unpredictable, and extended sequence period. Paper mainly focused on achieving high randomness by integrated the TRNG with a new promising crypto engine Keccak as a post-processing block; leads to extensively more security in data transfer, encryption keys, data authenticity of ICs, and IoT based applications. The RNG design is coded in Verilog HDL and implemented on the FPGA Zed board. Hashing is performed with a throughput of 2.4Gbps at 100 MHz either with RNG data or SHA data. Evaluated the randomness of the generated non-deterministic bitstreams (10 Mb) using the NIST 800-22 & Diehard test suite and successfully passed.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Secure Hash Algorithm SHA-3
    Dirk Fox
    Datenschutz und Datensicherheit - DuD, 2013, 37 (2) : 104 - 104
  • [42] A high-speed unified hardware architecture for 128 and 256-bit security levels of AES and the SHA-3 candidate Grostl
    Rogawski, Marcin
    Gaj, Kris
    Homsirikamol, Ekawat
    MICROPROCESSORS AND MICROSYSTEMS, 2013, 37 (6-7) : 572 - 582
  • [43] Algebraic Fault Analysis of SHA-3
    Luo, Pei
    Athanasiou, Konstantinos
    Fei, Yunsi
    Wahl, Thomas
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 151 - 156
  • [44] Performance Analysis of Modified SHA-3
    Chandran, Nithin R.
    Manuel, Ebin M.
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 904 - 910
  • [45] SHA-3 Implementation Using ReRAM based In-Memory Computing Architecture
    Bhattacharjee, Debjyoti
    Pudi, Vikramkumar
    Chattopadhyay, Anupam
    PROCEEDINGS OF THE EIGHTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED), 2017, : 325 - 330
  • [46] Efficient FPGA Implementation of Secure Hash Algorithm Grostl - SHA-3 Finalist
    Rao, M. Muzaffar
    Latif, Kashif
    Aziz, Arshad
    Mahboob, Athar
    EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 361 - +
  • [47] IMPROVING THE SECURITY OF MOBILE IPV6 SIGNALLING USING KECCAK / SHA-3
    Praptodiyono, Supriyanto
    Firmansyah, Teguh
    Murugesan, Raja Kumar
    Alaydrus, Mudrik
    Aprilia, Randy
    Leau, Yu-Beng
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2021, 16 (03): : 2312 - 2325
  • [48] SHA-2 and SHA-3 Based Sequence Randomization Algorithm
    Nugroho, Kuntoro Adi
    Hangga, Arimaz
    Sudana, I. Made
    2016 2ND INTERNATIONAL CONFERENCE ON SCIENCE AND TECHNOLOGY-COMPUTER (ICST), 2016,
  • [49] Improving FPGA based SHA-3 structures
    Sundal, Magnus
    Chaves, Ricardo
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 159 - 159
  • [50] ASIC Implementations of Five SHA-3 Finalists
    Guo, Xu
    Srivastav, Meeta
    Huang, Sinan
    Ganta, Dinesh
    Henry, Michael B.
    Nazhandali, Leyla
    Schaumont, Patrick
    DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 1006 - 1011