Abstract

As the number of IoT devices increases, security is one of the critical factors. Since random numbers are used to generate nonce and encryption keys, degradation of the randomness generated by TRNGs (True Random Number Generators) causes damage to system security. Several attacks have been proposed to reduce the randomness of the TRNG by changing the operating conditions, such as frequency injection, glitch impact, temperature change, and power supply voltage manipulation. In addition, the side-channel attack against TRNG is proposed to predict the random number output. This paper evaluates temperature variation and proposes side-channel attacks against COSO-based TRNG (coherent sampling ring oscillator-based TRNG). The results show that the temperature variation does not affect the randomness of the TRNG under the temperature range of 0°C to 80°C. On the other hand, the side-channel attack correctly read the random output numbers in 97.9 % of the cases. Note that the target circuit was connected to the output pin and side channel information was obtained from it. We propose two countermeasures against the side-channel attacks and demonstrate their effectiveness.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.