The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators

نویسندگان

  • A. Theodore Markettos
  • Simon W. Moore
چکیده

We have devised a frequency injection attack which is able to destroy the source of entropy in ring-oscillator-based true random number generators (TRNGs). A TRNG will lock to frequencies injected into the power supply, eliminating the source of random jitter on which it relies. We are able to reduce the keyspace of a secure microcontroller based on a TRNG from 2 to 3300, and successfully attack a 2004 EMV (‘Chip and PIN’) payment card. We outline a realistic covert attack on the EMV payment system that requires only 13 attempts at guessing a random number that should require 2. The theory, three implementations of the attack, and methods of optimisation are described.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator

True random number generators (TRNGs) are ubiquitous in data security as one of basic cryptographic primitives. They are primarily used as generators of confidential keys, to initialize vectors, to pad values, but also as random masks generators in some side channel attacks countermeasures. As such, they must have good statistical properties, be unpredictable and robust against attacks. This pa...

متن کامل

EM radiation analysis on True Random Number Generators: Frequency and localization retrieval method

True random number generators (TRNGs) are significant piece of hardware security that are used to generate secret keys, initial values or random masks for counter measures against side-channel attacks. Thus the security of implementation in hardware of such block is crucial. The work presented in this paper show that it is possible to find information on a TRNG using its electromagnetic radiati...

متن کامل

The Transient Behavior of LC and Ring Oscillators under External Frequency Injection

 In this work, time domain analysis is used to solve Adler’s equation in order to obtain the required time, for an oscillator under external injection, reaching the steady-state condition. Mathematical approach has been applied to fully describe the transient of frequency acquisition in injection-locked LC and Ring oscillators considering their time-varying nature. Then, the analysis is verifie...

متن کامل

Hardwar Trojan classification and implementation and offer a new detection approach

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

متن کامل

Entropy Evaluation for Oscillator-Based True Random Number Generators

True random number generators (TRNGs) are crucial to the implementations of cryptographic algorithms and protocols. The quality of randomness directly influences the security of cryptographic systems. Oscillator-based sampling is popular in the design of TRNGs due to its nice properties of elegant structure and high speed. However, the credibility of randomness generated from high-speed oscilla...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009