2022
DOI: 10.1109/access.2022.3167690
|View full text |Cite
|
Sign up to set email alerts
|

A Robust and Healthy Against PVT Variations TRNG Based on Frequency Collapse

Abstract: True Random Number Generator (TRNG) is used in many applications, generally for generating random cryptography keys. In this way, the trust of the cryptography system depends on the quality of the random numbers generated. However, the entropy fluctuations produced by external perturbations generate some false positives in the random sequence. These false positives can generate a disastrous scenario, depending on the application. This work presents the results of different tests to demonstrate the robustness a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 36 publications
1
3
0
Order By: Relevance
“…Moreover, the performance of the restart test on the random sequences, for which 1000 bits were collected by restarting the entropy source 1000 times, was also carried out successfully. With a minimum normalized entropy of 0.8780 and an average minimum entropy of 0.8875, our results are at par with earlier studies that utilize frequency collapse in multimodal ring oscillators (RO), , jitter in RO, metastability in latches, and natural decay in radio isotopes as entropy sources. After collecting the bit streams, they were subjected to test protocols under the NIST SP800-22 tests assessing a particular null hypothesis, which assumes that the sequence is random.…”
Section: Resultssupporting
confidence: 83%
“…Moreover, the performance of the restart test on the random sequences, for which 1000 bits were collected by restarting the entropy source 1000 times, was also carried out successfully. With a minimum normalized entropy of 0.8780 and an average minimum entropy of 0.8875, our results are at par with earlier studies that utilize frequency collapse in multimodal ring oscillators (RO), , jitter in RO, metastability in latches, and natural decay in radio isotopes as entropy sources. After collecting the bit streams, they were subjected to test protocols under the NIST SP800-22 tests assessing a particular null hypothesis, which assumes that the sequence is random.…”
Section: Resultssupporting
confidence: 83%
“…The NIST SP800‐90B tests were performed under the non‐IID track where the minimum entropies of 0.8644 and 0.8718 were achieved for both Key Alice and Key Bob , respectively, which are at par with earlier studies with the same testing parameters. [ 52‐56 ] In addition, the generated keys also pass all of the 15 NIST SP800‐22 tests with a confidence interval of 99%. These results are summarized in Figure S9a,b, (Supporting Information), respectively.…”
Section: Resultsmentioning
confidence: 99%
“…The health test denotes a 21 of Identical Values (I V ) for an entropy source with a binary sequence in the Repetition Count Test (RCT). Also, the Limit of the Maximum Cutoff Value (LM C V ) of 589 with window size (W ) of 1024 bits in the Adaptive Proportion Test (APT) [26]. The charge of the SFP in the NVRAM cell is calibrated to obtain the best condition in the entropy source.…”
Section: Methodsmentioning
confidence: 99%
“…The secure system typically implements a standalone TRNG, exploiting the different physical phenomena to obtain random numbers. For example, entropy sources based on a chaotic system [20]- [22], charge trapping in FinFet [23], the frequency collapse in multimodal ring oscillator [24]- [26], and metastability in latches [27]- [30]. However, the new approaches unified the TRNG with the memories used in the system, reducing the area overhead.…”
Section: Introductionmentioning
confidence: 99%