Skip to main content

The Design of Random Number Generator in an Embedded Crypto Module

  • Conference paper
  • 526 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4331))

Abstract

When using a real random number generator (RNG) with only a hardware component, as required for statistical randomness, it is difficult to create an unbiased and stable random bit stream. Although the hardware generating processor generates an output bit stream quickly, if the software filter algorithm is not efficient, the RNG consumes a relatively large amount of time. This factor becomes the limiting condition when the RNG is applied. Accordingly, this paper proposes a model approach to ensure the model of software filtering in the RNG processor and the chaos function model in the crypto module. Therefore, in the embedded crypto processor, the mixed model guarantees randomness of the output stream, is generated from the combined chaos function with a tent map transformation and a hardware random number generation component in sensor crypto communication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alireza, H., Ingrid, V.: High-Throughput Programmable Crypto-coprocessor. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  2. Jalal, A.M., Anand, R., Roy, C., Cerberus, M.D.M.: A Context-Aware Security Scheme for Smart Spaces. In: IEEE PerCom 2003 (2003)

    Google Scholar 

  3. Davies, R.: True random number, http://webnz.com/robert/true_rng.html

  4. Petrie, C.S., Connelly, J.A.: A Noise-Based Random Bit Generator IC for Applications in Cryptography. In: ISCAS 1998 (1998)

    Google Scholar 

  5. Delgado-Restituto, M., Medeiro, F., Rodriguez-Vasquez, A.: Nonlinear switched-current CMOS IC for random signal generation. IEE electronic letters (1993)

    Google Scholar 

  6. http://www.io.com/ritter/RES/NOISE.HTM

  7. http://www.clark.net/pub/cme/P1363/ranno.html

  8. http://webnz.com/robert/true_rng.html

  9. Ryabko, B.Y., Matchikina, E.: Fast and Efficient Construction of an Unbiased Random Sequence. IEEE Trans. on information theory (2000)

    Google Scholar 

  10. Diehard, http://stat.fsu.edu/geo/diehard.html

  11. Noble, C., Sugden, S.J.: Statistical Tests on Random Numbers I(1 through 80). A consulting report for Jupiters Network Gaming (1997)

    Google Scholar 

  12. Noble, C., Sugden, S.J.: Statistical Tests on Random Numbers II(0 through 127). A consulting report for Jupiters Network Gaming (1997)

    Google Scholar 

  13. Noble, C., Sugden, S.J.: Stochastic Recurrences of Jackpot KENO. Computational Statistics and Data Analysis (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hong, J., Kim, K., Son, D. (2006). The Design of Random Number Generator in an Embedded Crypto Module. In: Min, G., Di Martino, B., Yang, L.T., Guo, M., Rünger, G. (eds) Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. ISPA 2006. Lecture Notes in Computer Science, vol 4331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11942634_101

Download citation

  • DOI: https://doi.org/10.1007/11942634_101

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49860-5

  • Online ISBN: 978-3-540-49862-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics