Abstract
Random numbers with high cryptographic quality are needed to enhance the security of cryptography applications. Software heuristics for generating empirically strong random number sequences rely on entropy gathering by measuring unpredictable external events. These generators only deliver a few bits per event. This limits them to being used as seeds for pseudorandom generators.General-purpose processors feature a large number of hardware mechanisms that aim to improve performance: caches, branch predictors, …. The state of these components is not architectural (i.e., the result of an ordinary application does not depend on it). It is also volatile and cannot be directly monitored by the user. On the other hand, every operating system interrupt modifies thousands of these binary volatile states.In this article, we present and analyze HAVEGE (HArdware Volatile Entropy Gathering and Expansion), a new user-level software heuristic to generate practically strong random numbers on general-purpose computers. The hardware clock cycle counter of the processor can be used to gather part of the entropy/uncertainty introduced by operating system interrupts in the internal states of the processor. Then, we show how this entropy gathering technique can be combined with pseudorandom number generation in HAVEGE. Since the internal state of HAVEGE includes thousands of internal volatile hardware states, it seems impossible even for the user itself to reproduce the generated sequences.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Science Applications,Modelling and Simulation
Reference15 articles.
1. Compaq chooses SMT for Alpha;Diefendhorff K.;Microproc. Rep.,1999
2. Power4 focuses on memory bandwidth;Diefendhorff K.;Microproc. Rep.,1999
3. FIPS-140-2. 2001. Security requirements for cryptographic modules. Federal Information Processing Standard publication 140-2.]] FIPS-140-2. 2001. Security requirements for cryptographic modules. Federal Information Processing Standard publication 140-2.]]
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Origin Attribution of RSA Public Keys;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2021
2. E-BOOT: Preventing Boot-Time Entropy Starvation in Cloud Systems;IEEE Access;2020
3. Survey on Autoconfiguration Schemes in IPV6 Based Manets;Enabling Technologies and Architectures for Next-Generation Networking Capabilities;2019
4. Enhanced identity privacy in UMTS;International Journal of Ad Hoc and Ubiquitous Computing;2018
5. The entropy of a distributed computation random number generation from memory interleaving;Distributed Computing;2017-09-22