Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust

The hardware secure module is the common example of Root-of-Trust that used in cryptographic system, fundamentally it is generating, managing and provide protection to the cryptographic keys and performing cryptographic functions within its secure environments. A random number generator (RNG) is one...

Full description

Saved in:
Bibliographic Details
Main Author: Ong, Elaine Ei Ling
Format: Thesis
Language:English
Published: 2021
Subjects:
Online Access:http://eprints.utm.my/id/eprint/99433/1/ElaineOngEiLingMKE2021.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.99433
record_format uketd_dc
spelling my-utm-ep.994332023-02-27T04:36:54Z Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust 2021 Ong, Elaine Ei Ling TK Electrical engineering. Electronics Nuclear engineering The hardware secure module is the common example of Root-of-Trust that used in cryptographic system, fundamentally it is generating, managing and provide protection to the cryptographic keys and performing cryptographic functions within its secure environments. A random number generator (RNG) is one of the critical components in hardware Root-off-Trust, since one of the most important elements in securing cryptographic system is the keys generation. A cryptographically secure pseudorandom number generator (CSPRNG) is a pseudorandom number generator with properties that suitable to be used in cryptography systems for the keys generation. There are few CSPRNG standardized under NIST SP 800-90A Rev.1 which is Hash_DRBG, HMAC_DRBG and CTR_DRBG. Both Hash_DRBG and HMAC_DRBG is hash based DRBG. This project is performing the study of Hash_DRBG algorithm and understand that the core of the DRBG is the hash function. All the internal process of Hash_DRBG is using hash function such as the instantiate process, reseeding process, and pseudorandom numbers generation process. Therefore, the selection of hash function to be used in the Hash_DRBG is important. There are few SHA family available such as SHA0, SHA1 and SHA2. Based on previous work, SHA0 and SHA1 family algorithm can be break by the generic attacks such as Brute Force attack, domain extender attack, poisoned block attach, etc. Therefore, SHA2 family is preferable in this project, under this family, SHA-256 is used. This is because SHA-256 can provide better robustness compare to SHA-512. In the framework of multiple cryptographic cores, two SHA-256 can perform better in term of higher throughput and lower internal state compare to SHA-512. This project will be focusing on SHA-256 algorithm and applied pipeline architecture on the algorithm to help on decreasing the critical path for better performance. 2021 Thesis http://eprints.utm.my/id/eprint/99433/ http://eprints.utm.my/id/eprint/99433/1/ElaineOngEiLingMKE2021.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:149750 masters Universiti Teknologi Malaysia Faculty of Engineering - School of Electrical Engineering
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic TK Electrical engineering
Electronics Nuclear engineering
spellingShingle TK Electrical engineering
Electronics Nuclear engineering
Ong, Elaine Ei Ling
Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust
description The hardware secure module is the common example of Root-of-Trust that used in cryptographic system, fundamentally it is generating, managing and provide protection to the cryptographic keys and performing cryptographic functions within its secure environments. A random number generator (RNG) is one of the critical components in hardware Root-off-Trust, since one of the most important elements in securing cryptographic system is the keys generation. A cryptographically secure pseudorandom number generator (CSPRNG) is a pseudorandom number generator with properties that suitable to be used in cryptography systems for the keys generation. There are few CSPRNG standardized under NIST SP 800-90A Rev.1 which is Hash_DRBG, HMAC_DRBG and CTR_DRBG. Both Hash_DRBG and HMAC_DRBG is hash based DRBG. This project is performing the study of Hash_DRBG algorithm and understand that the core of the DRBG is the hash function. All the internal process of Hash_DRBG is using hash function such as the instantiate process, reseeding process, and pseudorandom numbers generation process. Therefore, the selection of hash function to be used in the Hash_DRBG is important. There are few SHA family available such as SHA0, SHA1 and SHA2. Based on previous work, SHA0 and SHA1 family algorithm can be break by the generic attacks such as Brute Force attack, domain extender attack, poisoned block attach, etc. Therefore, SHA2 family is preferable in this project, under this family, SHA-256 is used. This is because SHA-256 can provide better robustness compare to SHA-512. In the framework of multiple cryptographic cores, two SHA-256 can perform better in term of higher throughput and lower internal state compare to SHA-512. This project will be focusing on SHA-256 algorithm and applied pipeline architecture on the algorithm to help on decreasing the critical path for better performance.
format Thesis
qualification_level Master's degree
author Ong, Elaine Ei Ling
author_facet Ong, Elaine Ei Ling
author_sort Ong, Elaine Ei Ling
title Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust
title_short Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust
title_full Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust
title_fullStr Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust
title_full_unstemmed Hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust
title_sort hash function of cryptographically secure pseudorandom number generator for hardware root-of-trust
granting_institution Universiti Teknologi Malaysia
granting_department Faculty of Engineering - School of Electrical Engineering
publishDate 2021
url http://eprints.utm.my/id/eprint/99433/1/ElaineOngEiLingMKE2021.pdf
_version_ 1776100598401204224