Abstract
Ubiquitous computing raises security issues and a crypto card extend computing to physical spaces. Especially, a crypto module is a small computer in credit card format with no man machine interface. Some crypto module’s microprocessors use a random number generator(RNG) and cryptographic processors. Cryptographic procedures always require random numbers. A crypto card requires random numbers for key generation to authenticate the card and for encryption. Random numbers that cannot be predicted or influenced guarantee the security and the ideal solution is a H/W RNG in the crypto module’s microcontroller. Critical cryptography applications require the production of an unpredictable and unbiased stream of binary data derived from a fundamental noise mechanism, which is quite difficult to create with a stable random bit stream, as required for statistical randomness, when using a random generator with only a hardware component. Accordingly, this paper proposes a method for stabilizing the input power of a random number generator using fuzzy logic control in crypto module hardware. As such, the proposed scheme is designed to reduce the statistical property of a biased bit stream and optimize the input power to a random number generator engine in a crypto module engine for ubiquitous computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alireza, H., Ingrid, V.: High-Throughput Programmable Crypto-coprocessor. IEEE Computer Society, Los Alamitos (2004)
Jalal, A.M., Anand, R., Roy, C.: Cerberus: A Context-Aware Security Scheme for Smart Spaces. In: Proc. IEEE PerCom 2003 (2003)
Attoh-Okine, N.O., Shen, L.D.: Security Issues of Emerging Smart Cards Fare Collection Application in Mass Transit (1995)
WiTness: Interaction of SIM based WiTness security functions and security properties of mobile devices and communication channels, Information society (2003)
Thomas, S., Dabbish, E.A., Sloan, R.H.: Examing Smart-Card Security under the Threat of Power Analysis Attacks. IEEE Trans. On computers 51(5) (2002)
Wang, W., Ismail, F., Golnaraghi, F.: A Neuro-Fuzzy Approach to Gear System Monitoring. IEEE transactions on fuzzy systems 12(5) (2004)
Zang, R., Phillis, Y.A.: Admission control and scheduling in simple series paralleled networks using fuzzy logic. IEEE transaction on Fuzzy systems 9(2) (2001)
Klir, G.J., Yuan, B.: Fuzzy Sets and Fuzzy Logic Theory and Applications. Prentice-Hall International Inc., Englewood Cliffs (1995)
Le, Q., Knapp, G.M.: Incorporating Fuzzy Logic Admission Control In Simulation Models. In: Chick, S., Sanchez, P.J., Ferrin, D., Morrice, D.J. (eds.) Proc. Winter Simulation Conference (2003)
Kimberley, M.: Comparison of two statistical tests for keystream sequences. Electronics Letters 23(8) (1987)
Gustafson, H.M.: Statistical Analysis of Symmetric Ciphers, Thesis submitted in accordance with the regulations for Degree of doctor of Philosophy, Queensland University of Technology (1996)
Petrie, C.S., Connelly, J.A.: A Noise-Based Random Bit Generator IC for Applications in Cryptography. In: Proc. ISCAS 1998 (June 1998)
Delgado-Restituto, M., Medeiro, F., Rodriguez-Vasquez, A.: Nonlinear switched-current CMOS IC for random signal generation. IEE electronic letters 29 (December 1993)
Boris Ya, R., Matchikina, E.: Fast and Efficient Construction of an Unbiased Random Sequence. IEEE Trans. on information theory 46(3) (May 2000)
Holman, W.T., Connelly, J.A., Dowlatabadi, A.B.: An Integrated Analog/Digital Random Noise Source. IEEE Transactions on Circuits and System I: Fundamental Theory and Applications 44(6) (June 1997)
FIPS 140-1: Security Requirements for Cryptographic Modules, Federal Information Processing Standards Publication 140-1, U.S. Department of Commerce/NIST[National Technical Information Service] Springfield, Virginia (1994)
http://csrc.ncsl.nist.gov/fips/fips1401.htm (October 16, 1998)
Diehard (October 16, 1998), http://stat.fsu.edu/~geo/diehard.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hong, J. (2005). The Fuzzy Engine for Random Number Generator in Crypto Module. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_108
Download citation
DOI: https://doi.org/10.1007/978-3-540-31957-3_108
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25338-9
Online ISBN: 978-3-540-31957-3
eBook Packages: Computer ScienceComputer Science (R0)