Skip to main content

Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments

  • Conference paper
  • First Online:
Information Security Applications (WISA 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13720))

Included in the following conference series:

  • 384 Accesses

Abstract

In cryptography, random numbers are the most important element for security. Random numbers are generated through RNG (Random Number Generator), and collecting sufficient entropy sources is essential to generate random numbers. However, it is difficult to collect sufficient entropy sources due to limited resources in the IoT environment. In this paper, we have \(\alpha \)- and \(\beta \)-based radioactive decay noise sources to solve this problem, and generated entropy using proper entropy generation methods respectively. The result is as follows: \(\beta \)-based noise sources can generate entropy about 32 times faster than \(\alpha \)-based noise sources.

This research was financially supported by the Institute of Civil Military Technology Cooperation funded by the Defense Acquisition Program Administration and Ministry of Trade, Industry and Energy of Korean government under grant No. 21-CM-AU-09.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barker, E.B., Kelsey, J.M.: Recommendation for random bit generator (RBG) constructions. US Department of Commerce, National Institute of Standards and Technology (2012)

    Google Scholar 

  2. Bera, M.N., Acín, A., Kuś, M., Mitchell, M.W., Lewenstein, M.: Randomness in quantum mechanics: philosophy, physics and technology. Rep. Prog. Phys. 80(12), 124001 (2017)

    Article  MathSciNet  Google Scholar 

  3. Cho, S.M., Hong, E., Seo, S.H.: Random number generator using sensors for drone. IEEE Access 8, 30343–30354 (2020)

    Article  Google Scholar 

  4. Herrero-Collantes, M., Garcia-Escartin, J.C.: Quantum random number generators. Rev. Mod. Phys. 89(1), 015004 (2017)

    Article  MathSciNet  Google Scholar 

  5. ISO/IEC18031: Information technology - security techniques- random bit generation. International Organization for Standardization and International Electrotechnical Commission (2011)

    Google Scholar 

  6. ITU: Quantum noise random number generator architecture. ITU-T Rec X.1702 (2019)

    Google Scholar 

  7. Park, H.: A study on the security evaluation for cryptographically secure random number generators. Kookmin University, pp. 1–162 (2021)

    Google Scholar 

  8. Park, J., Cho, S., Lim, T., Tehranipoor, M.: QEC: a quantum entropy chip and its applications. IEEE Trans. Very Large Scale Integr. (VLSI) Systems 28(6), 1471–1484 (2020)

    Google Scholar 

  9. Park, K., et al.: A lightweight true random number generator using beta radiation for IoT applications. ETRI J. 42(6), 951–964 (2020)

    Article  Google Scholar 

  10. Rohe, M., et al.: Randy-a true-random generator based on radioactive decay. Saarland University, pp. 1–36 (2003)

    Google Scholar 

  11. TTA: Guideline for the collection and application of noise sources on operating systems. TTAK.KO-12.0235/R2 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Okyeon Yi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, T., Lee, S., Yun, S., Kim, J., Yi, O. (2023). Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments. In: You, I., Youn, TY. (eds) Information Security Applications. WISA 2022. Lecture Notes in Computer Science, vol 13720. Springer, Cham. https://doi.org/10.1007/978-3-031-25659-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25659-2_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25658-5

  • Online ISBN: 978-3-031-25659-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics