TY - GEN
T1 - Power analysis of a chaos-based random number generator for cryptographic security
AU - Pareschi, Fabio
AU - Scotti, Giuseppe
AU - Giancane, Luca
AU - Rovatti, Riccardo
AU - Setti, Gianluca
AU - Trifiletti, Alessandro
N1 - Generated from Scopus record by KAUST IRTS on 2023-02-15
PY - 2009/10/26
Y1 - 2009/10/26
N2 - In this paper we consider a side-channel attack on a chaos-based Random Number Generator (RNG) based on power consumption analysis. The aim of this attack is to verify if it is possible to retrieve information regarding the internal state of the chaotic system used to generate the random bits. In fact, one of the most common arguments against this kind of RNGs is that, due to the deterministic nature of the chaotic circuit on which they rely, the system cannot be truly unpredictable. Here we analyze the power consumption profile of a chaos-based RNG prototype we designed in 0.35 μm CMOS technology, showing that for the proposed circuit the internal state (and therefore the future evolution) of the system cannot be determined with a side-channel attack based on a power analysis. This property makes the proposed RNG perfectly suitable for high-security cryptographic applications. ©2009 IEEE.
AB - In this paper we consider a side-channel attack on a chaos-based Random Number Generator (RNG) based on power consumption analysis. The aim of this attack is to verify if it is possible to retrieve information regarding the internal state of the chaotic system used to generate the random bits. In fact, one of the most common arguments against this kind of RNGs is that, due to the deterministic nature of the chaotic circuit on which they rely, the system cannot be truly unpredictable. Here we analyze the power consumption profile of a chaos-based RNG prototype we designed in 0.35 μm CMOS technology, showing that for the proposed circuit the internal state (and therefore the future evolution) of the system cannot be determined with a side-channel attack based on a power analysis. This property makes the proposed RNG perfectly suitable for high-security cryptographic applications. ©2009 IEEE.
UR - http://ieeexplore.ieee.org/document/5118398/
UR - http://www.scopus.com/inward/record.url?scp=70350165296&partnerID=8YFLogxK
U2 - 10.1109/ISCAS.2009.5118398
DO - 10.1109/ISCAS.2009.5118398
M3 - Conference contribution
SN - 9781424438280
SP - 2858
EP - 2861
BT - Proceedings - IEEE International Symposium on Circuits and Systems
ER -