Revealing the secret parameters of an FPGA-based “True” random number generator

Salih Ergün, Burak Acar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

A new response system is suggested to show the security vulnerabilities of an FPGA-based chaotic "true" random number generator (RNG). The auto-synchronization method is used to justify the success of the response system. The hidden parameter of the chaotic RNG is revealed when the design of the RNG is open to everyone and a limited scalar time series can be monitored from the chaotic RNG. Experimental results prove the applicability of the response system in a way of estimating next bit while the same bit stream of the RNG can be reproduced.

Original languageEnglish
Title of host publication2020 IEEE International Symposium on Circuits and Systems, ISCAS 2020 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728133201
Publication statusPublished - 2020
Externally publishedYes
Event52nd IEEE International Symposium on Circuits and Systems, ISCAS 2020 - Virtual, Online
Duration: 10 Oct 202021 Oct 2020

Publication series

NameProceedings - IEEE International Symposium on Circuits and Systems
Volume2020-October
ISSN (Print)0271-4310

Conference

Conference52nd IEEE International Symposium on Circuits and Systems, ISCAS 2020
CityVirtual, Online
Period10/10/2021/10/20

Bibliographical note

Publisher Copyright:
© 2021 IEEE

Keywords

  • Auto-synchronization
  • FPGA
  • Random number generator
  • Security weaknesses

Fingerprint

Dive into the research topics of 'Revealing the secret parameters of an FPGA-based “True” random number generator'. Together they form a unique fingerprint.

Cite this