True Random Number Generators Secure in a Changing Environment
- Boaz BarakAffiliated withDepartment of Computer Science and, Applied Mathematics, Weizmann Institute of Science
- , Ronen ShaltielAffiliated withDepartment of Computer Science and, Applied Mathematics, Weizmann Institute of Science
- , Eran TromerAffiliated withDepartment of Computer Science and, Applied Mathematics, Weizmann Institute of Science
A true random number generator (TRNG) usually consists of two components: an “unpredictable” source with high entropy, and a randomness extractor — a function which, when applied to the source, produces a result that is statistically close to the uniform distribution. When the output of a TRNG is used for cryptographic needs, it is prudent to assume that an adversary may have some (limited) influence on the distribution of the high-entropy source. In this work:
We define a mathematical model for the adversary’s influence on the source.
We show a simple and efficient randomness extractor and prove that it works for all sources of sufficiently high-entropy, even if individual bits in the source are correlated.
Security is guaranteed even if an adversary has (bounded) influence on the source.
Our approach is based on a related notion of “randomness extraction” which emerged in complexity theory. We stress that the statistical randomness of our extractor’s output is proven, and is not based on any unproven assumptions, such as the security of cryptographic hash functions.
A sample implementation of our extractor and additional details can be found at a dedicated web page [Web].
- True Random Number Generators Secure in a Changing Environment
- Book Title
- Cryptographic Hardware and Embedded Systems - CHES 2003
- Book Subtitle
- 5th International Workshop, Cologne, Germany, September 8–10, 2003. Proceedings
- pp 166-180
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Industry Sectors
- Editor Affiliations
- 4. Comodo Research Lab
- 5. Information Security Research Center, Istanbul Commerce University
- 6. Horst Görtz Institute for IT Security, Ruhr University Bochum
- Author Affiliations
- 7. Department of Computer Science and, Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel
To view the rest of this content please follow the download PDF link above.