TET 8/14/2002 CHES2002, Rev 0.1 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names.

Slides:



Advertisements
Similar presentations
Motorola, October 3, 2006 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the.
Advertisements

MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
Motorola Confidential Proprietary MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names.
Motorola General Business Use MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are.
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
LINEAR FEEDBACK SHIFT REGISTERS, GALOIS FIELDS, AND STREAM CIPHERS Mike Thomsen Cryptography II May 14 th, 2012.
Chapter 9 Computer Design Basics. 9-2 Datapaths Reminding A digital system (or a simple computer) contains datapath unit and control unit. Datapath: A.
Digital Design - Sequential Logic Design Chapter 3 - Sequential Logic Design.
Digital Systems Design VHDL in Bluetooth Baseband Module by Marc A. Mackey.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
1 EE 587 SoC Design & Test Partha Pande School of EECS Washington State University
Copyright 2005, Agrawal & BushnellVLSI Test: Lecture 21alt1 Lecture 21alt BIST -- Built-In Self-Test (Alternative to Lectures 25, 26 and 27) n Definition.
1 How to launch a blogging program that works with your organization Mary Owens Director, Intranet Content & Strategy Corporate Internal Communication,
Announcements: Matlab: tutorial available at Matlab: tutorial available at
Chris Murphy 31 January 2005 Motorola General Business Information MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Linearization of Stream Ciphers in Terms of Cellular Automata Amparo Fúster-Sabater Institute of Applied Physics (CSIC) Madrid (Spain)
Design for Testability Theory and Practice Lecture 11: BIST
Announcements: Assignment 2 finalized Assignment 2 finalizedQuestions?Today: Wrap up Hill ciphers Wrap up Hill ciphers One-time pads and LFSR One-time.
Design and Implementation of a True Random Number Generator Based on Digital Circuit Artifacts Michael Epstein 1, Laszlo Hars 2, Raymond Krasinski 1, Martin.
Comparison of LFSR and CA for BIST
6. Practical Constructions of Symmetric-Key Primitives
ENGIN112 L26: Shift Registers November 3, 2003 ENGIN 112 Intro to Electrical and Computer Engineering Lecture 26 Shift Registers.
Generating Random Numbers in Hardware. Two types of random numbers used in computing: --”true” random numbers: ++generated from a physical source (e.g.,
Motorola Document Classification, File Name, Rev Number Add additional legal text here if required by your local Legal Counsel. MOTOROLA and the Stylized.
Motorola Document Classification, File Name, Rev Number Add additional legal text here if required by your local Legal Counsel. MOTOROLA and the Stylized.
DLS Digital Controller Tony Dobbing Head of Power Supplies Group.
HCS12 Technical Training, Rev 2.0 Module 11- BDLC, Slide 1 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other.
MCU: Interrupts and Timers Ganesh Pitchiah. What’s an MCU ?
Low Latency Clock Domain Transfer for Simultaneously Mesochronous, Plesiochronous and Heterochronous Interfaces Wade Williams Philip Madrid, Scott C. Johnson.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
More Digital circuits. Ripple Counter The most common counter The problem is that, because more than one output is changing at once, the signal is glichy.
Linear Feedback Shift Register. 2 Linear Feedback Shift Registers (LFSRs) These are n-bit counters exhibiting pseudo-random behavior. Built from simple.
Lecture #27 Page 1 ECE 4110– Sequential Logic Design Lecture #27 Agenda 1.Counters Announcements 1.HW #12 due.
Reaction Timer Project
TOPIC : Signature Analysis. Introduction Signature analysis is a compression technique based on the concept of (CRC) Cyclic Redundancy Checking It realized.
Motorola Canopy  LENS Antenna A simple, cost effective way for Canopy Network Operators to increase antenna gain and reach more subscribers.
A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University.
© 2009 Pearson Education, Upper Saddle River, NJ All Rights ReservedFloyd, Digital Fundamentals, 10 th ed Digital Logic Design Dr. Oliver Faust.
1. Motorola Confidential Proprietary MOTOROLA, the Stylized M Logo, and MOTOWI4 are registered in the US Patent & Trademark Office. All other product.
Freescale Semiconductor Confidential and Proprietary Information. Freescale™ and the Freescale logo are trademarks of Freescale Semiconductor, Inc. All.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
Microcontroller based system design Asst. Prof. Dr. Alper ŞİŞMAN.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective.
1 SVY 207: Lecture 5 The Pseudorange Observable u Aim of this lecture: –To understand how a receiver extracts a pseudorange measurement from a GPS signal.
HCS12 Technical Training Module 15 – Break Module Slide 1 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other.
Real-life cryptography Pfeiffer Alain.  Types of PRNG‘s  History  General Structure  User space  Entropy types  Initialization process  Building.
RTL Hardware Design by P. Chu Chapter 9 – ECE420 (CSUN) Mirzaei 1 Sequential Circuit Design: Practice Shahnam Mirzaei, PhD Spring 2016 California State.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
1.  How does the computer generate observations from various distributions specified after input analysis?  There are two main components to the generation.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 2 – Stream Ciphers These slides were.
1 Modeling Synchronous Logic Circuits Debdeep Mukhopadhyay Associate Professor Dept of Computer Science and Engineering NYU Shanghai and IIT Kharagpur.
Design of OCDMA Demonstrator Yun Ping Yang, Alireza Hodjat, Herwin Chan, Eric Chen, Josh Conway.
Digital Design - Sequential Logic Design
Clock Signals: 555 Timer 555 Timer Digital Electronics TM
By Byron Gorsuch & Dane Gentry
Clocks A clock is a free-running signal with a cycle time.
Computer Architecture & Operations I
VLSI Testing Lecture 14: Built-In Self-Test
Cryptography Lecture 15.
Stream Ciphers Day 18.
Introduction to Modern Symmetric-key Ciphers
What is the motion simple pendulum called?
Prof. Saravanan Vijayakumaran
Sequential Logic.
CH 6. Stream Ciphers Information Security & IoT Lab 김해용
Cryptography Lecture 15.
Presentation transcript:

TET 8/14/2002 CHES2002, Rev 0.1 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. © Motorola, Inc A Hardware Random Number Generator Thomas Tkacik, Motorola

Desired Properties of Random Numbers ● Unpredictable ● Lack of bias ● Bit Independence ● Nonrepeatable ● Long cycle length

RNG Block Diagram 43 bit LFSR 37 bit CASR Oscillator 1 Oscillator 2 32 bit select

Linear Feedback Shift Register ● 43 bit LFSR ● Characteristic polynomial X 43 + X 41 + X 20 + X + 1 ● Maximal length Cycle length = ● There is a slight bias Bias ~ bit LFSR 37 bit CASR Oscillator 1 Oscillator 2 32 bit select

Cellular Automata Shift Register ● 37 bit CASR ● CA90a i (t+1) = a i-1 (t) ^ a i+1 (t) ● CA150a i (t+1) = a i-1 (t) ^ a i (t) ^ a i+1 (t) ● CA150 is at bit 28, CA90 used elsewhere ● Maximal length Cycle length = ● There is a slight bias Bias ~ bit LFSR 37 bit CASR Oscillator 1 Oscillator 2 32 bit select

LFSR and CASR Combination ● Combination is formed by permuting and XORing 32 bits of LFSR and CASR ● The combination has a cycle length of Cycle length = ● The bias is reduced to Bias ~ bit LFSR 37 bit CASR Oscillator 1 Oscillator 2 32 bit select

State-Time Diagram for LFSR, CASR and Combined Generator Time LFSR CASR Combination 43 bit LFSR 37 bit CASR Oscillator 1 32 bit select

DIEHARD Results for LFSR, CASR and Combined Generator 43 bit LFSR 37 bit CASR Osc 1 Osc 2

Summary ● A Hardware Random Number Generator composed of simple components 43 bit LFSR 37 bit CASR Oscillator's frequency's vary with voltage and temperature State registers are not reset at power-up ● Written as RTL The oscillators have instantiated inverters ● The oscillator clocks can be turned off for low power applications