HAVEGE

Author:

Seznec André1,Sendrier Nicolas2

Affiliation:

1. IRISA-INRIA, France

2. INRIA, France

Abstract

Random numbers with high cryptographic quality are needed to enhance the security of cryptography applications. Software heuristics for generating empirically strong random number sequences rely on entropy gathering by measuring unpredictable external events. These generators only deliver a few bits per event. This limits them to being used as seeds for pseudorandom generators.General-purpose processors feature a large number of hardware mechanisms that aim to improve performance: caches, branch predictors, …. The state of these components is not architectural (i.e., the result of an ordinary application does not depend on it). It is also volatile and cannot be directly monitored by the user. On the other hand, every operating system interrupt modifies thousands of these binary volatile states.In this article, we present and analyze HAVEGE (HArdware Volatile Entropy Gathering and Expansion), a new user-level software heuristic to generate practically strong random numbers on general-purpose computers. The hardware clock cycle counter of the processor can be used to gather part of the entropy/uncertainty introduced by operating system interrupts in the internal states of the processor. Then, we show how this entropy gathering technique can be combined with pseudorandom number generation in HAVEGE. Since the internal state of HAVEGE includes thousands of internal volatile hardware states, it seems impossible even for the user itself to reproduce the generated sequences.

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Science Applications,Modelling and Simulation

Reference15 articles.

1. Compaq chooses SMT for Alpha;Diefendhorff K.;Microproc. Rep.,1999

2. Power4 focuses on memory bandwidth;Diefendhorff K.;Microproc. Rep.,1999

3. FIPS-140-2. 2001. Security requirements for cryptographic modules. Federal Information Processing Standard publication 140-2.]] FIPS-140-2. 2001. Security requirements for cryptographic modules. Federal Information Processing Standard publication 140-2.]]

Cited by 18 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Origin Attribution of RSA Public Keys;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2021

2. E-BOOT: Preventing Boot-Time Entropy Starvation in Cloud Systems;IEEE Access;2020

3. Survey on Autoconfiguration Schemes in IPV6 Based Manets;Enabling Technologies and Architectures for Next-Generation Networking Capabilities;2019

4. Enhanced identity privacy in UMTS;International Journal of Ad Hoc and Ubiquitous Computing;2018

5. The entropy of a distributed computation random number generation from memory interleaving;Distributed Computing;2017-09-22

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3