2018
DOI: 10.1109/tii.2018.2815985
|View full text |Cite
|
Sign up to set email alerts
|

A Hardware and Secure Pseudorandom Generator for Constrained Devices

Abstract: Hardware security for an Internet of Things (IoT) or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resourceconstrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the N-cube… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 47 publications
(12 citation statements)
references
References 51 publications
0
11
0
1
Order By: Relevance
“…Other implementations, as [32], and [33] use their complete state as output, with 96 and 20 bits, respectively. Regarding [34] and [35], they use a chaotic iteration post-processing technique to improve the randomness of linear PRNGs. These do not need DSP cells, however the complete output of the chaotic post-processing is used as output.…”
Section: Comparison With Other Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Other implementations, as [32], and [33] use their complete state as output, with 96 and 20 bits, respectively. Regarding [34] and [35], they use a chaotic iteration post-processing technique to improve the randomness of linear PRNGs. These do not need DSP cells, however the complete output of the chaotic post-processing is used as output.…”
Section: Comparison With Other Solutionsmentioning
confidence: 99%
“…In terms of Encryption_rate and Encryption_rate/resource the implementation in this work clearly achieves a good result. Although [32], [34] and [35] present better Encryption_rate, it is at expense of using their complete state as output, which reduces the security. Indeed they are mainly proposed as PRNGs.…”
Section: Comparison With Other Solutionsmentioning
confidence: 99%
“…In other schemes, e.g. [7], [8], the dimension reduction is combined with a permutation function of the bits to be produced, which improves the statistical properties. However, in the case where function g requires additional state variables, the evolution of these variables must be placed into f .…”
Section: Figure 1: General Scheme Of a Random Number Generatormentioning
confidence: 99%
“…The work presented in this paper asserts that both f and g can be defined thanks to two weak PRNGs, i.e., not statistically robust, but generally operating in low-dimensional spaces and extremely fast. This approach has been successfully used in the following cases [8] with U = B 32 , f similar to the aforementioned Taus88, and the g function composed of a XOR between the Taus88 state variables (x 1 , x 2 , x 3 ) (as in Taus88) and a simplified version of PCG32 [7] whose internal state is S pcg32 = B 64 . This PRNG has been deployed on FPGA.…”
Section: Figure 1: General Scheme Of a Random Number Generatormentioning
confidence: 99%
See 1 more Smart Citation