Other Open Access

# Two Methods of the Clock Jitter Measurement Aimed at Embedded TRNG Testing

Oto Petura; Marek Laban; Elie Noumon Allini; Viktor Fischer

### DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
<identifier identifierType="DOI">10.5281/zenodo.1284209</identifier>
<creators>
<creator>
<creatorName>Oto Petura</creatorName>
<affiliation>Hubert Curien Laboratory, UMR 5516 CNRS, Jean Monnet University Saint-Etienne 18, rue Pr. Lauras, 42000 Saint-Etienne, France</affiliation>
</creator>
<creator>
<creatorName>Marek Laban</creatorName>
<affiliation>MICRONIC a.s., Sliacska 2/C, 83102, Bratislava, Slovakia, Department of Electronics and Multimedia Communications Technical University of Kosice Park Komenskeho 13, 04120 Kosice, Slovakia</affiliation>
</creator>
<creator>
<creatorName>Elie Noumon Allini</creatorName>
<affiliation>Hubert Curien Laboratory, UMR 5516 CNRS, Jean Monnet University Saint-Etienne 18, rue Pr. Lauras, 42000 Saint-Etienne, France</affiliation>
</creator>
<creator>
<creatorName>Viktor Fischer</creatorName>
<affiliation>Hubert Curien Laboratory, UMR 5516 CNRS, Jean Monnet University Saint-Etienne 18, rue Pr. Lauras, 42000 Saint-Etienne, France</affiliation>
</creator>
</creators>
<titles>
<title>Two Methods of the Clock Jitter Measurement Aimed at Embedded TRNG Testing</title>
</titles>
<publisher>Zenodo</publisher>
<publicationYear>2018</publicationYear>
<subjects>
<subject>TRNG</subject>
<subject>jitter</subject>
<subject>ring oscillators</subject>
<subject>variance</subject>
</subjects>
<dates>
<date dateType="Issued">2018-06-06</date>
</dates>
<language>en</language>
<resourceType resourceTypeGeneral="Text">Other</resourceType>
<alternateIdentifiers>
<alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/1284209</alternateIdentifier>
</alternateIdentifiers>
<relatedIdentifiers>
<relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.1284208</relatedIdentifier>
<relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/hector</relatedIdentifier>
</relatedIdentifiers>
<rightsList>
<rights rightsURI="http://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
<rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
</rightsList>
<descriptions>
<description descriptionType="Abstract">&lt;p&gt;In modern cryptographic systems, security is based on quality and unpredictability of confidential keys. These keys are generated in random number generators using random physical phenomena appearing inside the cryptographic system on chip. The most frequently used source of randomness in digital devices is the jitter of clock signals generated inside the device in ring oscillators, self-timed rings, RC oscillators, phase-locked loops (PLLs), etc. The quality and unpredictability of generated numbers depends on the quality and the size of the clock jitter. It is therefore a good practice to monitor this jitter continuously using some embedded jitter measurement method. The measured jitter parameters can be then used as input parameters of the stochastic model used to estimate entropy, which characterizes unpredictability of generated numbers. In this paper, we present and compare two methods of embedded jitter assessment based on the measurement of the variance of counter values, obtained by counting the periods of the jittery clock during a time interval defined by a reference clock generated in the same device. Besides comparing obvious design results such as area, speed, and power consumption, we observe and discuss the impact of the two embedded variance measurement methods on the clock jitter itself, and compare the behavior of the two clock generators used as sources of randomness with and without clock variance measurement circuitry, and with and without additional logic such as an AES cipher, which perturbs the variance computation, as it is the case in most cryptographic embedded systems. This comparison is very important for a good estimation of the low entropy bound from the measurement results.&lt;br&gt;
&amp;nbsp;&lt;/p&gt;</description>
</descriptions>
<fundingReferences>
<fundingReference>
<funderName>European Commission</funderName>
<funderIdentifier funderIdentifierType="Crossref Funder ID">10.13039/501100000780</funderIdentifier>
<awardNumber awardURI="info:eu-repo/grantAgreement/EC/H2020/644052/">644052</awardNumber>
<awardTitle>HARDWARE ENABLED CRYPTO AND RANDOMNESS</awardTitle>
</fundingReference>
</fundingReferences>
</resource>

20
10
views
downloads
All versions This version
Views 2020
Downloads 1010
Data volume 4.5 MB4.5 MB
Unique views 2020
Unique downloads 99