How Random is Random Enough For Cryptography?
Paul Dillien, Principal, High Tech Marketing
5/11/2015 01:50 PM EDT
How can one create a random stream of bits suitable for use in encryption and embed this solution in an FPGA?
Random numbers in cryptography are key (pun intended). They can be a weak point in a crypto system and, consequently, are frequently the target of attack. So I've been trying to get my head around the subject of randomness.
I was always taught that thermal noise from a diode junction was random, but now -- it seems -- not random enough. Cryptographers inhabit a twilight world where they are always trying to think up possible attack methods by the bad guys and then figuring out ways to defeat them. And it's a good thing that they do, as most people (me included) rely on secure communications for transactions like on-line banking and shopping. But I digress...
Many of the top gurus of cryptography work at the National Institute of Standards and Technology (NIST). This organization published specifications of how to make an apparently random stream of bits suitable for use in encryption. The solution in its specification SP800-90A is to take the bit stream and encrypt it in a machine called a Deterministic Random Bit Generator (DRBG) to create a Random Number Generator (RNG). That makes sense to me.
To read the full article, click here
Related Semiconductor IP
- True Random Number Generator (TRNG) IP
- Cryptographically Secure Pseudo Random number Generator IP Core
- TRNG (True Random Number Generator) NIST SP800-90C
- Fast NIST ESV certified, FIPS (SP800-90A/B/C) True Random Number Generator
- NIST ESV certified, AIS-31, FIPS (SP800-90A/B/C) True Random Number Generator
Related White Papers
- How AI is changing the game for high-performance SoC designs
- The Importance of True Randomness in Cryptography
- An Unexpected IoT Problem: Not Enough Randomness
- Lockdown! Random Numbers Secure Network SoC Designs
Latest White Papers
- Enabling Space-Grade AI/ML with RISC-V: A Fully European Stack for Autonomous Missions
- CANDoSA: A Hardware Performance Counter-Based Intrusion Detection System for DoS Attacks on Automotive CAN bus
- How Next-Gen Chips Are Unlocking RISC-V’s Customization Advantage
- Efficient Hardware-Assisted Heap Memory Safety for Embedded RISC-V Systems
- Automatically Retargeting Hardware and Code Generation for RISC-V Custom Instructions