2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC) 2020
DOI: 10.1109/fdtc51366.2020.00010
|View full text |Cite
|
Sign up to set email alerts
|

Attacking Hardware Random Number Generators in a Multi-Tenant Scenario

Abstract: True random number generators are important building blocks for cryptographic systems and can be the target of adversaries that want to break cryptographic protocols by reducing the unpredictability of the used random numbers. This paper examines the viability of three different types of potential attacks on these generators when they are implemented on field programmable gate arrays, namely the voltage manipulation attack, the ring-oscillator locking attack and the replica observation attack. The proposed att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
(29 reference statements)
0
1
0
Order By: Relevance
“…This would constitute a forbidden situation, which NIST explicitly warns against in its recommendations [9]. This problem is well known and increasingly reported in research on secure initialization of random generators for cryptographic systems [10][11][12][13][14][15][16]. Having a well-designed PRBG is not sufficient, because in the case of the described entropy problems, random generators implemented serially on several different devices can generate almost identical random sequences.…”
Section: Block Cipher Countermentioning
confidence: 99%
See 1 more Smart Citation
“…This would constitute a forbidden situation, which NIST explicitly warns against in its recommendations [9]. This problem is well known and increasingly reported in research on secure initialization of random generators for cryptographic systems [10][11][12][13][14][15][16]. Having a well-designed PRBG is not sufficient, because in the case of the described entropy problems, random generators implemented serially on several different devices can generate almost identical random sequences.…”
Section: Block Cipher Countermentioning
confidence: 99%
“…Using the same value repeatedly in the process of initializing pseudo-random algorithms raises risks for attacks that affect DRBG (Deterministic Random Bit Generator) initialization [9]. Despite the knowledge of these standards, it is still challenging to provide multiple efficient and attack-resistant entropy sources in the design process of random generators [10][11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…Since the minimal estimate is above the model-predicted 0.770, we can conclude that this type of attack on the TROT seems insufficiently effective. We performed the frequency injection attacks equivalent to those proposed in [45] and [46], which were proven successful when applied on the single-edge RO-based TRNGs. For our attacks, we inject oscillating signals in the delay line next to the three-edge RO to induce strong interaction between the RO signal and the injected signal.…”
Section: Resilience Against the Attacks Voltage And Temperature Varia...mentioning
confidence: 99%