Skip to main content

Generative Adversarial Networks-Based Pseudo-Random Number Generator for Embedded Processors

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12593))

Abstract

A pseudo-random number generator (PRNG) is a fundamental building block for modern cryptographic solutions. In this paper, we present a novel PRNG based on generative adversarial networks (GAN). A recurrent neural network (RNN) layer is used to overcome the problems of predictability and reproducibility for long random sequences, which is found in the result of the NIST test suite for the previous method. The proposed design generates a random number of 1,099,200-bits with a 64-bit seed. The proposed method is also efficiently implemented on embedded processors by using the Edge TPU. To support the Edge TPU, the proposed GAN based PRNG is converted to a TensorFlow Lite model. During model training, the number of epochs is significantly reduced with the proposed approach. The PRNG generates random numbers in 13.27 ms using the Edge TPU. Also, our PRNG achieved a speed of 1.0 GB/s, which is about 6.25x compared to the speed of other lightweight PRNG. To the best of our knowledge, this is the first GAN based PRNG for embedded processors. Finally, generated random numbers were tested through the NIST random number test suite. Compared with the previous method, the proposed method reduced the percentage of test failures by 2.85x. The result shows that the proposed GAN-based PRNG achieved high randomness even on embedded processors.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://www.vice.com/en_uk/topic/motherboard.

  2. 2.

    https://coral.ai/docs/edgetpu/benchmarks/.

  3. 3.

    https://www.blog.google/products/google-cloud/bringing-intelligence-to-the-edge-with-cloud-iot/.

  4. 4.

    https://coral.ai/models/.

References

  1. Dabal, P., Pelka, R.: FPGA implementation of chaotic pseudo-random bit generators. In: Proceedings of the 19th International Conference Mixed Design of Integrated Circuits and Systems, MIXDES 2012, pp. 260–264. IEEE (2012)

    Google Scholar 

  2. Pande, A., Zambreno, J.: A chaotic encryption scheme for real-time embedded systems: design and implementation. Telecommun. Syst. 52(2), 551–561 (2013)

    Google Scholar 

  3. Azzaz, M., Tanougast, C., Sadoudi, S., Dandache, A.: Real-time FPGA implementation of Lorenz’s chaotic generator for ciphering telecommunications. In: 2009 Joint IEEE North-East Workshop on Circuits and Systems and TAISA Conference, pp. 1–4. IEEE (2009)

    Google Scholar 

  4. de la Fraga, L.G., Torres-Pérez, E., Tlelo-Cuautle, E., Mancillas-López, C.: Hardware implementation of pseudo-random number generators based on chaotic maps. Nonlinear Dyn. 90(3), 1661–1670 (2017). https://doi.org/10.1007/s11071-017-3755-z

    Article  Google Scholar 

  5. De Bernardi, M., Khouzani, M.H.R., Malacaria, P.: Pseudo-random number generation using generative adversarial networks. In: Alzate, C., et al. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11329, pp. 191–200. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-13453-2_15

    Chapter  Google Scholar 

  6. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  Google Scholar 

  7. Nyquist, H.: Thermal agitation of electric charge in conductors. Phys. Rev. 32(1), 110 (1928)

    Article  Google Scholar 

  8. Stipčević, M.: Fast nondeterministic random bit generator based on weakly correlated physical events. Rev. Sci. Instrum. 75(11), 4442–4449 (2004)

    Article  Google Scholar 

  9. Figotin, A., et al.: Random number generator based on the spontaneous alpha-decay. US Patent 6,745,217, 1 June 2004

    Google Scholar 

  10. Stefanov, A., Gisin, N., Guinnard, O., Guinnard, L., Zbinden, H.: Optical quantum random number generator. J. Mod. Opt. 47(4), 595–598 (2000)

    Google Scholar 

  11. Vincent, C.: The generation of truly random binary numbers. J. Phys. E: Sci. Instrum. 3(8), 594 (1970)

    Article  Google Scholar 

  12. Schneier, B., Kohno, T., Ferguson, N.: Cryptography Engineering: Design Principles and Practical Applications. Wiley, Hoboken (2013)

    Google Scholar 

  13. Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), pp. 265–283 (2016)

    Google Scholar 

  14. Sengupta, J., Kubendran, R., Neftci, E., Andreou, A.G.: High-speed, real-time, spike-based object tracking and path prediction on google edge TPU. In: AICAS, pp. 134–135 (2020)

    Google Scholar 

  15. Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672–2680 (2014)

    Google Scholar 

  16. Schawinski, K., Zhang, C., Zhang, H., Fowler, L., Santhanam, G.K.: Generative adversarial networks recover features in astrophysical images of galaxies beyond the deconvolution limit. Monthly Not. R. Astron. Soci. Lett. 467(1), L110–L114 (2017)

    Google Scholar 

  17. Wang, X., et al.: ESRGAN: enhanced super-resolution generative adversarial networks. In: Leal-Taixé, L., Roth, S. (eds.) ECCV 2018. LNCS, vol. 11133, pp. 63–79. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-11021-5_5

    Chapter  Google Scholar 

  18. Schuster, M., Paliwal, K.K.: Bidirectional recurrent neural networks. IEEE Trans. Signal Process. 45(11), 2673–2681 (1997)

    Article  Google Scholar 

  19. Hong, S.L., Liu, C.: Sensor-based random number generator seeding. IEEE Access 3, 562–568 (2015)

    Article  Google Scholar 

  20. Kietzmann, P., Schmidt, T., Wählisch, M.: A guideline on pseudorandom number generation (PRNG) in the IoT, July 2020

    Google Scholar 

  21. Paul, B., Khobragade, A., Javvaji Sai, S., Goswami, S.S.P., Dutt, S., Trivedi, G.: Design and implementation of low-power high-throughput PRNGs for security applications. In: 2019 32nd International Conference on VLSI Design and 2019 18th International Conference on Embedded Systems (VLSID), pp. 535–536 (2019)

    Google Scholar 

Download references

Acknowledgement

This work was partly supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2020R1F1A1048478) and this work was partly supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government(MSIT) (No. 2018-0-00264, Research on Blockchain Security Technology for IoT Services).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hwajeong Seo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, H., Kwon, Y., Sim, M., Lim, S., Seo, H. (2021). Generative Adversarial Networks-Based Pseudo-Random Number Generator for Embedded Processors. In: Hong, D. (eds) Information Security and Cryptology – ICISC 2020. ICISC 2020. Lecture Notes in Computer Science(), vol 12593. Springer, Cham. https://doi.org/10.1007/978-3-030-68890-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68890-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68889-9

  • Online ISBN: 978-3-030-68890-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics