Conference paper Open Access

TOTAL: TRNG On-the-fly Testing for Attack detection using Lightweight hardware

Yang, Bohan; Rozic, Vladimir; Mentens, Nele; Dehaene, Wim; Verbauwhede, Ingrid


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nam##2200000uu#4500</leader>
  <controlfield tag="005">20200120142013.0</controlfield>
  <datafield tag="500" ind1=" " ind2=" ">
    <subfield code="a">H2020 644052 / HECTOR</subfield>
  </datafield>
  <controlfield tag="001">55455</controlfield>
  <datafield tag="711" ind1=" " ind2=" ">
    <subfield code="d">14 March 2016</subfield>
    <subfield code="g">DATE 2016</subfield>
    <subfield code="a">Design, Automation &amp; Test in Europe Conference &amp; Exhibition</subfield>
    <subfield code="c">Dresden, Germany</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">KU Leuven</subfield>
    <subfield code="a">Rozic, Vladimir</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">KU Leuven</subfield>
    <subfield code="a">Mentens, Nele</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">KU Leuven</subfield>
    <subfield code="a">Dehaene, Wim</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">KU Leuven</subfield>
    <subfield code="a">Verbauwhede, Ingrid</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">192016</subfield>
    <subfield code="z">md5:b78bc246aedbf085b2ffb3e97d65edb6</subfield>
    <subfield code="u">https://zenodo.org/record/55455/files/HECTOR-TRNG-on-the-fly-testing-2016.pdf</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="y">Conference website</subfield>
    <subfield code="u">https://www.date-conference.com/date16/</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2016-03-14</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">openaire</subfield>
    <subfield code="p">user-ecfunded</subfield>
    <subfield code="p">user-hector</subfield>
    <subfield code="o">oai:zenodo.org:55455</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">KU Leuven</subfield>
    <subfield code="a">Yang, Bohan</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">TOTAL: TRNG On-the-fly Testing for Attack detection using Lightweight hardware</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-ecfunded</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">user-hector</subfield>
  </datafield>
  <datafield tag="536" ind1=" " ind2=" ">
    <subfield code="c">644052</subfield>
    <subfield code="a">HARDWARE ENABLED CRYPTO AND RANDOMNESS</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">http://creativecommons.org/licenses/by-nc-sa/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution Non Commercial Share Alike 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;We present a design methodology for embedded tests of entropy sources. These tests are necessary to detect attacks and failures of true random number generators. The central idea of this work is to use an empirical design methodology consisting of two phases: collecting the data under attack and finding a useful statistical feature. In this work we focus on statistical features that are implementable in lightweight hardware. This is the first paper to address the design of on-the-fly tests based on the attack effects. The presented design methodology is illustrated with 2 examples: an elementary ring-oscillator based TRNG and a carry-chain based TRNG. The effectiveness of the tests was confirmed on FPGA prototypes.&lt;br&gt;
 &lt;/p&gt;</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.55455</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">publication</subfield>
    <subfield code="b">conferencepaper</subfield>
  </datafield>
</record>
26
16
views
downloads
All versions This version
Views 2626
Downloads 1616
Data volume 3.1 MB3.1 MB
Unique views 2626
Unique downloads 1616

Share

Cite as