Dissertationen zum Thema „True Random Number Generator (TRNG)“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-26 Dissertationen für die Forschung zum Thema "True Random Number Generator (TRNG)" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Petura, Oto. „True random number generators for cryptography : Design, securing and evaluation“. Thesis, Lyon, 2019. http://www.theses.fr/2019LYSES053.
Der volle Inhalt der QuelleRandom numbers are essential for modern cryptographic systems. They are used as cryptographic keys, nonces, initialization vectors and random masks for protection against side channel attacks. In this thesis, we deal with random number generators in logic devices (Field Programmable Gate Arrays – FPGAs and Application Specific Integrated Circuits – ASICs). We present fundamental methods of generation of random numbers in logic devices. Then, we discuss different types of TRNGs using clock jitter as a source of randomness. We provide a rigorous evaluation of various AIS-20/31 compliant TRNG cores implemented in three different FPGA families : Intel Cyclone V, Xilinx Spartan-6 and Microsemi SmartFusion2. We then present the implementation of selected TRNG cores in custom ASIC and we evaluate them. Next, we study PLL-TRNG in depth in order to provide a secure design of this TRNG together with embedded tests. Finally, we study oscillator based TRNGs. We compare different randomness extraction methods as well as different oscillator types and the behavior of the clock jitter inside each of them. We also propose methods of embedded jitter measurement for online testing of oscillator based TRNGs
Karanam, Shashi Prashanth. „Tiny true random number generator“. Fairfax, VA : George Mason University, 2009. http://hdl.handle.net/1920/4587.
Der volle Inhalt der QuelleVita: p. 91. Thesis director: Jens-Peter Kaps. Submitted in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering. Title from PDF t.p. (viewed Oct. 12, 2009). Includes bibliographical references (p. 88-90). Also issued in print.
Mureddu, Ugo. „Génération d'aléa dans les circuits électroniques numériques exploitant des cellules oscillantes“. Thesis, Lyon, 2019. http://www.theses.fr/2019LYSES018.
Der volle Inhalt der QuelleWith the sharp increase in the deployment and integration of the Internet of Things, one challenge is to ensure security with respect to privacy and trust issues. With billions of connected devices, there is a huge risk of unauthorized use or abuse. To protect from such risks, security mechanisms are neede for per-device authentication and authorization, integrated in early design stages. Thankfully, cryptographic functions allow ciphering of sensitive data, as well as per-device authentication and authorization since they guarantee confidentialify, authenticity, integrity and non-repudiation. In this context, physical random generator (random number generator TRNG and physical unclonable functions PUF) are particularly useful since they generate secret keys, random masks or unique identifiers. The robustness of the cryptographic functions stand by the quality of the physical random generators. For that, numbers provided by those generators must be entropic. Otherwise, keys used to cipher data could be broken and identifiers could be retrieved. That's why, it is necessary to study physical random generators. In this thesis, we provide a rigorous approach to implement TRNGs and PUFs in reconfigurable logic devices. After that, we integrate those generators in a complete system. We also propose an innovative approach to evaluate the quality of PUF by modeling their behavior prior to designing it. This should he!p designers anticipate PUF quality in term of randomness. We also realize a complete a study of two kind of threats on physical random generators using oscillating cells: the locking phenomena and the EM analysis
Noumon, Allini Elie. „Caractérisation, évaluation et utilisation du jitter d'horloge comme source d'aléa dans la sécurité des données“. Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES019.
Der volle Inhalt der QuelleThis thesis, funded by the DGA, is motivated by the problem of evaluation of TRNG for applications with a very high level of security. As current standards such as AIS-31 are not sufficient for these types of applications, the DGA proposes a complementary procedure, validated on TRNG using ring oscillators (RO), which aims to characterize the source of randomness of TRNG in order to identify electronic noises present in it. These noises are manifested in the digital circuits by the clock jitter generated in the RO. They can be characterized by their power spectral density related to the time Allan variance which allows, unlike the standard variance which is still widely used, to discriminate these different types of noise (mainly thermal, flicker). This study was used as a basis for estimating the proportion of jitter due to thermal noise used in stochastic models describing the output of TRNG. In order to illustrate and validate the DGA certification approach on other principles of TRNG apart from RO, we propose a characterization of PLL as a source of randomness. We have modeled the PLL in terms of transfer functions. This modeling has led to the identification of the source of noise at the output of the PLL, as well as its nature as a function of the physical parameters of the PLL. This allowed us to propose recommendations on the choice of parameters to ensure maximum entropy. In order to help in the design of this type of TRNG, we also propose a tool to search for the non-physical parameters of the generator ensuring the best compromise between security and throughput
Mitchum, Sam. „Digital Implementation of a True Random Number Generator“. VCU Scholars Compass, 2010. http://scholarscompass.vcu.edu/etd/2327.
Der volle Inhalt der QuelleYadav, Avantika. „Design and Analysis of Digital True Random Number Generator“. VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3229.
Der volle Inhalt der QuelleBazzi, Hussein. „Resistive memory co-design in CMOS technologies“. Electronic Thesis or Diss., Aix-Marseille, 2020. http://www.theses.fr/2020AIXM0567.
Der volle Inhalt der QuelleMany diversified applications (internet of things, embedded systems for automotive and medical applications, artificial intelligence) require an integrated circuit (SoC, System on Chip) with high-performance non-volatile memories to operate optimally. Although Flash memory is widely used today, this technology needs high voltage for programing operations and has reliability issues that are hard to handle beyond 18 nm technological node, increasing the cost of circuit design and fabrication. In this context, the semiconductor industry seeks an alternative non-volatile memory that can replace Flash memories. Among possible candidates (MRAM - Magnetic Random Access Memory, PCM - Phase Change Memory, FeRAM - Ferroelectric Random Access Memory), Resistive memories (RRAMs) offer superior performances on essential key points: compatibility with CMOS manufacturing processes, scalability, current consumption (standby and active), operational speed. Due to its relatively simple structure, RRAM technology can be easily integrated in any design flow opening the way for the development of new architectures that answer Von Neumann bottleneck. In this thesis, the main object is to show the integration abilities of RRAM devices with CMOS technology, using circuit design and electrical measurements, in order to develop different hybrid structures: non-volatile Static Random Access Memories (SRAM), True Random Number Generator (TRNG) and artificial neural networks
Shanmuga, Sundaram Prassanna. „Development of a FPGA-based True Random Number Generator for Space Applications“. Thesis, Linköping University, Electronics System, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-54534.
Der volle Inhalt der QuelleRandom numbers are required for cryptographic applications such as IT security products, smart cards etc. Hardwarebased random number generators are widely employed. Cryptographic algorithms are implemented on FieldProgrammable Gate Arrays (FPGAs). In this work a True Random Number Generator (TRNG) employed for spaceapplication was designed, investigated and evaluated. Several cryptographic requirements has to be satisfied for therandom numbers. Two different noise sources was designed and implemented on the FPGA. The first design wasbased on ring oscillators as a noise source. The second design was based on astable oscillators developed on a separatehardware board and interfaced with the FPGA as another noise source. The main aim of the project was to analyse theimportant requirement of independent noise source on a physical level. Jitter from the oscillators being the source forthe randomness, was analysed on both the noise sources. The generated random sequences was finally subjected tostatistical tests.
Gärtner, Joel. „Analysis of Entropy Usage in Random Number Generators“. Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-214567.
Der volle Inhalt der QuelleKryptografiskt säkra slumptalsgeneratorer behöver ofta initialiseras med ett oförutsägbart frö. En annan lösning är att istället konstant ge slumptalsgeneratorer entropi. Detta gör det möjligt att garantera att det interna tillståndet i generatorn hålls oförutsägbart. I den här rapporten analyseras fyra sådana generatorer som matas med entropi. Dessutom presenteras olika sätt att skatta entropi och en ny skattningsmetod utvecklas för att användas till analysen av generatorerna. Den framtagna metoden för entropiskattning lyckas bra i tester och används för att analysera entropin i de olika generatorerna. Alla analyserade generatorer uppvisar beteenden som inte verkar optimala för generatorns funktionalitet. De flesta av de analyserade generatorerna verkar dock oftast säkra att använda.
Botha, Roelof Cornelis. „The development of a hardware random number generator for gamma-ray astronomy / R.C. Botha“. Thesis, North-West University, 2005. http://hdl.handle.net/10394/581.
Der volle Inhalt der QuelleThesis (M.Sc. (Physics))--North-West University, Potchefstroom Campus, 2005.
Zouhar, Petr. „Generátor náhodných čísel“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218290.
Der volle Inhalt der QuelleLiu, Chengxin. „Jitter in oscillators with 1/f noise sources and application to true RNG for cryptography“. Link to electronic dissertation, 2006. http://www.wpi.edu/Pubs/ETD/Available/etd-011006-221104/.
Der volle Inhalt der QuelleJíra, Roman. „Generování náhodných čísel pomocí magnetických nanostruktur“. Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2015. http://www.nusl.cz/ntk/nusl-232088.
Der volle Inhalt der QuelleBen, Romdhane Molka. „Modélisation, implémentation et caractérisation de circuits générateurs de nombres aléatoires vrais pour la certification de crypto-processeurs“. Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0055/document.
Der volle Inhalt der QuelleRandom numbers are required in numerous applications namely in cryptography where randomness is used in security protocols. There are two main classes of Random Number Generators (RNG) : The Pseudo RNG (PRNG) which have a deterministic sequence, and the True RNG (TRNG) which generates unpredictable random numbers. Cryptographic applications use both TRNG and PRNG. The PRNG needs an initial value, or seed, which can be the output of a TRNG. In digital technologies, like FPGAs, TRNG are commonly based on oscillators which have the drawback of being biased by harmonic coupling. In order to assess the entropic quality of TRNGs, standards based on statistical tests have been elaborated by certification organisms namely the NIST and the BSI. However, it is recommended to formalize the stochastic behaviour of the randomness generation process. In this Ph.D, we address the design and quality evaluation of TRNGs in digital circuits. We study of a low-cost digital TRNG without oscillators, hence robust against harmonics attacks. The proposed TRNG exploits both the metastability phenomenon and the jitter noise in CMOS digital flip-flops to generate the random numbers. A stochastic model of this TRNG has been formalized. This model describes the random generation process regardless of the targeted technology. The characterization and evaluation on a prototype circuit, in FPGA and ASIC technologies, has shown that the proposed TRNG architecture generates randomness of good quality and is robust against environmental variations
Ben, Romdhane Molka. „Modélisation, implémentation et caractérisation de circuits générateurs de nombres aléatoires vrais pour la certification de crypto-processeurs“. Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0055.
Der volle Inhalt der QuelleRandom numbers are required in numerous applications namely in cryptography where randomness is used in security protocols. There are two main classes of Random Number Generators (RNG) : The Pseudo RNG (PRNG) which have a deterministic sequence, and the True RNG (TRNG) which generates unpredictable random numbers. Cryptographic applications use both TRNG and PRNG. The PRNG needs an initial value, or seed, which can be the output of a TRNG. In digital technologies, like FPGAs, TRNG are commonly based on oscillators which have the drawback of being biased by harmonic coupling. In order to assess the entropic quality of TRNGs, standards based on statistical tests have been elaborated by certification organisms namely the NIST and the BSI. However, it is recommended to formalize the stochastic behaviour of the randomness generation process. In this Ph.D, we address the design and quality evaluation of TRNGs in digital circuits. We study of a low-cost digital TRNG without oscillators, hence robust against harmonics attacks. The proposed TRNG exploits both the metastability phenomenon and the jitter noise in CMOS digital flip-flops to generate the random numbers. A stochastic model of this TRNG has been formalized. This model describes the random generation process regardless of the targeted technology. The characterization and evaluation on a prototype circuit, in FPGA and ASIC technologies, has shown that the proposed TRNG architecture generates randomness of good quality and is robust against environmental variations
Madau, Maxime. „A methodology to localise EMFI areas on Microcontrollers“. Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS045.
Der volle Inhalt der QuelleToday, security of embedded devices is put in the limelight with the increasing market share of both IoT and automotive.To ensure a proper level of security to its customer such embedded components must undergo pentesting either to obtain some certifications to address security market but also to avoid tarnishing the name of the firm in case of vulnerability.Amongst the various attack paths, one of most threatening is the voluntary violation of operation condition to induce a fault on a circuit.These faults are then used for privilege escalation or combined with statistic tools to recover cryptographic keys. This thesis focuses on the use of electromagnetic field to generate such faults, this medium being the one that offers the best trade-off between cost and accuracy.The efficiency of such family of attack has already been demonstrated in the literature. Yet fault injection techniques shared a common problem which root cause is the amount of parameter an evaluator has to tweaks to obtain a fault. Therefore, it is hard to state whether a target is protected against fault injection since evaluation is bounded in time, thus exhaustive search is not an option.Metrics or strategies should be defined to get the most out of up to date fault injection methods.This thesis is a first step towards defining such metrics, and proposed to tackle the space complexity of EM fault injection. In other words, according to the attack scenario we developed metrics or strategy relying on both experimentation and state of the art. The aims of those metrics/strategy being to reduce the space on the DUT that undergo electromagnetic emanation to the most likely to be faulted area.In a first part, a criterion based on a basic model of the coupling between the injection probes and the circuit as well as today fault model will be developed.This criterion is then analysed and a refinement is proposed.Yet fault injection could also be used to nullify countermeasure that disable some attack vectors. Most of those countermeasures have in common the use of a true random generator.Thence in a second part we evaluate the robustness of an up to date true random number generator against electromagnetic perturbation.From this analysis we derived which parts of true random number generator are more relevant to be targeted using electromagnetic waves
Wang, You. „Analyse de fiabilité de circuits logiques et de mémoire basés sur dispositif spintronique“. Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0005/document.
Der volle Inhalt der QuelleSpin transfer torque magnetic tunnel junction (STT-MTJ) has been considered as a promising candidate for next generation of non-volatile memories and logic circuits, because it provides a perfect solution to overcome the bottleneck of increasing static power caused by CMOS technology scaling. However, its commercialization is limited by the poor reliability, which deteriorates severely with device scaling down. This thesis focuses on the reliability investigation of MTJ based non-volatile circuits. Firstly, a compact model of MTJ including main reliability issues is proposed and validated by the comparison with experimental data. Based on this accurate model, the reliability of typical circuits is analyzed and reliability optimization methodology is proposed. Finally, the stochastic switching behavior is utilized in some new designs of conventional applications
Wang, You. „Analyse de fiabilité de circuits logiques et de mémoire basés sur dispositif spintronique“. Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0005.
Der volle Inhalt der QuelleSpin transfer torque magnetic tunnel junction (STT-MTJ) has been considered as a promising candidate for next generation of non-volatile memories and logic circuits, because it provides a perfect solution to overcome the bottleneck of increasing static power caused by CMOS technology scaling. However, its commercialization is limited by the poor reliability, which deteriorates severely with device scaling down. This thesis focuses on the reliability investigation of MTJ based non-volatile circuits. Firstly, a compact model of MTJ including main reliability issues is proposed and validated by the comparison with experimental data. Based on this accurate model, the reliability of typical circuits is analyzed and reliability optimization methodology is proposed. Finally, the stochastic switching behavior is utilized in some new designs of conventional applications
Xiao, Yi-Wen, und 蕭亦雯. „The Construction of Physical Unclonable Function (PUF) and True-Random-Number Generator (TRNG) Based on FinFET Variation“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/8ryr27.
Der volle Inhalt der Quelle國立交通大學
電子研究所
107
This thesis mainly developed a multivariable analysis to study the source/drain(S/D) variation in FinFETs. With the scaling of CMOS technology, aggressive scaling of fin-pitch and contact length reduces the contact area. Nevertheless, few studies have been focused on the variation of S/D region, which should be a big concern for next generation device design. Then, we utilized the result of multivariable analysis to construct the Physical Unconable Function (PUF) and True Random Number Generator (TRNG). In the Internet of Things (IoT) era, both PUF and TRNG play very important role in embedded cryptographic system designs. First, we developed a multivariable analysis to quantify the impact of S/D region variation on device driving current. When channel length scales down to nanometer, the channel resistance rolls off at the same time; however, Rsd accounts for an increasing proportion of the total resistance. Therefore, Rsd cannot be ignored while improving the performance of the advanced generation devices. Next, to get more information about the Rsd, the Virtual Source Model will be introduced in chapter 2. Also, the doping profile along the direction of channel to S/D region can be extracted by discrete dopant profiling. Owing to these aforementioned techniques, the source of Rsd variation can be delineated, in which dopant is dominant (76.3~89.4%) and interface trap is a secondary factor (10.6~23.7%) with less contribution to the Rsd variation, in both n-FinFET and p-FinFET. The Physical Unclonable Function (PUF) will be introduced in chapter 3. During IC manufacturing process, variability occurs and creates different physical microstructures. These manufacturing variations cannot be fully controlled and re-fabricated intentionally, so the underlying physical properties are unique and become silicon fingerprints of individual ICs. That’s why PUF can be seen as the fingerprint of devices; hence, the suitable variation source for PUF is important. We utilize the S/D mismatch current to achieve PUFs and show the great performance (Inter-HD~49.9952%, Hamming Weight~50%) of S/D-mismatch-based PUF. Also, after 150℃ 720hrs thermal stress experiment, the unstable bits are still near 0. In the fabrication process, there are some lithography induced traps in S/D junction. These traps will induce not only the variation of S/D resistance, but also the RTN phenomenon. Because of the characteristic of randomness in RTN, we can use the junction-RTN phenomenon to construct the TRNG. In order to prove the randomness of TRNGs, we use the junction-RTN TRNG to generate 65536 random bits and evaluate these random numbers though NIST, showing that the random numbers pass 9 statistic tests.
PECKA, Stanislav. „Návrh a implementace generátoru náhodných čísel“. Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-390147.
Der volle Inhalt der QuelleLee, Ming-Che, und 李明哲. „True Random Number Generator Circuit Designs“. Thesis, 2002. http://ndltd.ncl.edu.tw/handle/38313599152176219850.
Der volle Inhalt der Quelle國立清華大學
電機工程學系
90
As the government, the business, and many personal users are gradually adopting the electronic methods to store information, information security has been a highly noticed important issue. Among all the methods that can provide information security, cryptographic systems provide the maximum flexibility and safety. In a cryptographic system, there are some essential, safety-related initial values, public keys, and private keys needed to be generated. Because these values have something to do with the security of the whole cryptographic system, they need to be random and unpredictable. A random number generator is applied to generate these randomly produced (not calculated) values. Generally speaking, the security of a cryptographic system relies mainly on the goodness of both the algorithm and the random number generator. In order to cooperate with the ACP/NP project, we tried to implement three different kinds of true random number generators. As for Discrete-Time Chaos method, we mentioned the problems that might occur when designing the circuit and proposed ways to solve them. Because we use analog circuit to implement a mathematically well-behaved equation, the simulation results can pass all the requirements for random data defined in “Security Requirements for Cryptographic Modules, FIPS PUB 140-2”, which is proposed by NIST (National Institute of Standards and Technology) in 2001. As for Oscillator Sampling method, we proposed a circuit that can increase the phase noise and a compensation method in case the outputs cannot pass the requirements for random data. As for the Pure Digital Circuit method, we concluded that this method is not practical in real case according to our drawing the layout and running the post simulation of the circuit.
黃建元. „A Contact Resistive Random Access Memory Based True Random Number Generator“. Thesis, 2012. http://ndltd.ncl.edu.tw/handle/85553721471604883853.
Der volle Inhalt der Quelle國立清華大學
電子工程研究所
100
With the popularization of the Internet, data transmission has become more convenient and highly mobile. In order to prevent data theft, data encryption system is essential to modern communication chips. A stable and True Random Number Generator (TRNG) is a key element to ensure the security of transmitted data. TRNG based on the trapping and de-trapping process in the oxide defects has been proposed in recent years. Generating random numbers using electron trapping has several advantages. First, as the source of this random process occurs naturally, hence the resulting random number is aperiodic. In addition, the output is generally insensitive to temperature. Random number generator circuits depend on random latching of inverter pair can subject to mismatch effects. In a MOSFET, random telegraph noise (RTN) refers to the drain current fluctuation (ID-RTN) as a result of the change in the amount of carriers flowing from source to drain. These RTN signals with discrete drain current levels is generally very small and can lead to misleading results after amplifications. In this paper, we proposed a TRNG based on the RTN signals found in the contact resistive random access memory (CRRAM) device. As reported in previous studies, the resistance levels of both the high and low resistance states are subject to high RTN, leading to large read current noises as a results of electron trapping in the conductive pathway. These RTN signals from the embedded CRRAM cells is much larger than ID-RTN, which allows CRRAM to be more appropriate source for generating true random number for encryption circuitry.
Mendes, Pedro Miguel Nunes. „Random Number Generator based on Ring Oscillators for IoT applications“. Master's thesis, 2017. http://hdl.handle.net/10362/30817.
Der volle Inhalt der QuelleLI, YI-CING, und 李易青. „Design of chaos-based true random number generator and real-time voice encryption system“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/bym8gj.
Der volle Inhalt der Quelle國立雲林科技大學
電機工程系
107
This thesis aims to propose a new design approach for a true random number generator (TRNG) to improve the randomness of the traditional random number generator. As well known, the traditional TRNG cannot be clearly modeled and effectively controlled and applied, while these problems can be well solved by using the TRNG design in this thesis. First, we propose a new structure based on chaotic system for the generation of true random numbers. The Chi-square test and NIST test are used as the standard for evaluating the true random number. Secondly, using the sliding mode control method, the synchronization controller is proposed to achieve the synchronization of the master-slave TRNGs. After successfully completing the modeling and synchronization of the true random numbers, we integrate these research results to design a real-time voice encryption system. In this system, we use the real random number as the key of the voice encryption system. By combining with the concept of dynamic password, the overall security of encrypted voice is improved and the high security voice encryption system design is completed.
Majzoobi, Mehrdad. „Lightweight Silicon-based Security: Concept, Implementations, and Protocols“. Thesis, 2013. http://hdl.handle.net/1911/71995.
Der volle Inhalt der QuelleAbraham, Nithin. „Van der Waals Heterojunctions for Emerging Device Applications“. Thesis, 2022. https://etd.iisc.ac.in/handle/2005/6049.
Der volle Inhalt der Quelle