2020
DOI: 10.3390/s20071869
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm

Abstract: In the context of growing the adoption of advanced sensors and systems for active vehicle safety and driver assistance, an increasingly important issue is the security of the information exchanged between the different sub-systems of the vehicle. Random number generation is crucial in modern encryption and security applications as it is a critical task from the point of view of the robustness of the security chain. Random numbers are in fact used to generate the encryption keys to be used for ciphers. Conseque… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
21
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 27 publications
(22 citation statements)
references
References 11 publications
0
21
0
1
Order By: Relevance
“…Depending on the nature of the entropy source, the randomness can be generated either in the analogue world (e.g., noise or sensors [6]) or in the digital world (e.g., Jitter). There are also examples in literature [7] of Cryptographically Secure Pseudo-Random Number Generator (CSPRNG); such circuits, however, requires a TRNG to work. Due to their intrinsic close relationship with analogue parameters of the circuit, True Random Number Generators are usually tailored on specific silicon technology and are not easily scalable on programmable hardware, without affecting their entropy.…”
Section: Introduction: Random Number Generation For Securitymentioning
confidence: 99%
“…Depending on the nature of the entropy source, the randomness can be generated either in the analogue world (e.g., noise or sensors [6]) or in the digital world (e.g., Jitter). There are also examples in literature [7] of Cryptographically Secure Pseudo-Random Number Generator (CSPRNG); such circuits, however, requires a TRNG to work. Due to their intrinsic close relationship with analogue parameters of the circuit, True Random Number Generators are usually tailored on specific silicon technology and are not easily scalable on programmable hardware, without affecting their entropy.…”
Section: Introduction: Random Number Generation For Securitymentioning
confidence: 99%
“…It hinders utilizing it directly for the applications and further demands high system resources, which is unavailable in low power IoT devices. [140] This limitation is alleviated by the deterministic algorithm based Pseudo-Random Number Generator (PRNG) to generate the random bitstream. Cryptographically secure PRNG (CSPRNG) requires high entropy input seed meeting its security strength, and this seed determines its internal state making the random number generation unpredictable.…”
Section: True Random Number Generatormentioning
confidence: 99%
“…Architectural design of a configurable (at synthesis level) ECC crypto-processor for NIST P-256 and/or NIST P-521 elliptic curves, developed in the framework of the European Processor Initiative together with other cryptographic hardware accelerators (AES, RNG [27,28], SHA [29]). The proposed architecture supports the most used cryptographic schemes based on ECC such as ECDSA, ECDH, ECIES and ECMQV.…”
mentioning
confidence: 99%