Skip to main content

The Fuzzy Engine for Random Number Generator in Crypto Module

  • Conference paper
Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

  • 722 Accesses

Abstract

Ubiquitous computing raises security issues and a crypto card extend computing to physical spaces. Especially, a crypto module is a small computer in credit card format with no man machine interface. Some crypto module’s microprocessors use a random number generator(RNG) and cryptographic processors. Cryptographic procedures always require random numbers. A crypto card requires random numbers for key generation to authenticate the card and for encryption. Random numbers that cannot be predicted or influenced guarantee the security and the ideal solution is a H/W RNG in the crypto module’s microcontroller. Critical cryptography applications require the production of an unpredictable and unbiased stream of binary data derived from a fundamental noise mechanism, which is quite difficult to create with a stable random bit stream, as required for statistical randomness, when using a random generator with only a hardware component. Accordingly, this paper proposes a method for stabilizing the input power of a random number generator using fuzzy logic control in crypto module hardware. As such, the proposed scheme is designed to reduce the statistical property of a biased bit stream and optimize the input power to a random number generator engine in a crypto module engine for ubiquitous computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alireza, H., Ingrid, V.: High-Throughput Programmable Crypto-coprocessor. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  2. Jalal, A.M., Anand, R., Roy, C.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: Proc. IEEE PerCom 2003 (2003)

    Google Scholar 

  3. Attoh-Okine, N.O., Shen, L.D.: Security Issues of Emerging Smart Cards Fare Collection Application in Mass Transit (1995)

    Google Scholar 

  4. WiTness: Interaction of SIM based WiTness security functions and security properties of mobile devices and communication channels, Information society (2003)

    Google Scholar 

  5. Thomas, S., Dabbish, E.A., Sloan, R.H.: Examing Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Trans. On computers 51(5) (2002)

    Google Scholar 

  6. Wang, W., Ismail, F., Golnaraghi, F.: A Neuro-Fuzzy Approach to Gear System Monitoring. IEEE transactions on fuzzy systems 12(5) (2004)

    Google Scholar 

  7. Zang, R., Phillis, Y.A.: Admission control and scheduling in simple series paralleled networks using fuzzy logic. IEEE transaction on Fuzzy systems 9(2) (2001)

    Google Scholar 

  8. Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic Theory and Applications. Prentice-Hall International Inc., Englewood Cliffs (1995)

    MATH  Google Scholar 

  9. Le, Q., Knapp, G.M.: Incorporating Fuzzy Logic Admission Control In Simulation Models. In: Chick, S., Sanchez, P.J., Ferrin, D., Morrice, D.J. (eds.) Proc. Winter Simulation Conference (2003)

    Google Scholar 

  10. Kimberley, M.: Comparison of two statistical tests for keystream sequences. Electronics Letters 23(8) (1987)

    Google Scholar 

  11. Gustafson, H.M.: Statistical Analysis of Symmetric Ciphers, Thesis submitted in accordance with the regulations for Degree of doctor of Philosophy, Queensland University of Technology (1996)

    Google Scholar 

  12. Petrie, C.S., Connelly, J.A.: A Noise-Based Random Bit Generator IC for Applications in Cryptography. In: Proc. ISCAS 1998 (June 1998)

    Google Scholar 

  13. Delgado-Restituto, M., Medeiro, F., Rodriguez-Vasquez, A.: Nonlinear switched-current CMOS IC for random signal generation. IEE electronic letters 29 (December 1993)

    Google Scholar 

  14. http://www.io.com/~ritter/RES/NOISE.HTM

  15. http://www.clark.net/pub/cme/P1363/ranno.html

  16. http://webnz.com/robert/true_rng.html

  17. Boris Ya, R., Matchikina, E.: Fast and Efficient Construction of an Unbiased Random Sequence. IEEE Trans. on information theory 46(3) (May 2000)

    Google Scholar 

  18. Holman, W.T., Connelly, J.A., Dowlatabadi, A.B.: An Integrated Analog/Digital Random Noise Source. IEEE Transactions on Circuits and System I: Fundamental Theory and Applications 44(6) (June 1997)

    Google Scholar 

  19. FIPS 140-1: Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication 140-1, U.S. Department of Commerce/NIST[National Technical Information Service] Springfield, Virginia (1994)

    Google Scholar 

  20. http://csrc.ncsl.nist.gov/fips/fips1401.htm (October 16, 1998)

  21. Diehard (October 16, 1998), http://stat.fsu.edu/~geo/diehard.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hong, J. (2005). The Fuzzy Engine for Random Number Generator in Crypto Module. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_108

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_108

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics