Cryptographically Secure PseudoRandom Bit Generator for Wearable Technology
Author:
Melosik Michał1, Galan Mariusz2, Naumowicz Mariusz1, Tylczyński Piotr1, Koziol Scott3ORCID
Affiliation:
1. Department of Computer Science and Telecommunications, Poznan University of Technology, Piotrowo 3A, 60-965 Poznan, Poland 2. Intel Technology Poland, Juliusza Słowackiego 173, 80-298 Gdańsk, Poland 3. Electrical & Computer Engineering Department, Baylor University, One Bear Place #97356, Waco, TX 76798, USA
Abstract
This paper presents a prototype wearable Cryptographically Secure PseudoRandom Bit Generator CSPRBG (wearable CSPRBG). A vest prototype has been fabricated to which an evaluation board with a ZYBO (ZYnq BOard) Zynq Z-7010 has been mounted using tailoring technology. In this system, a seed generator and block cryptographic algorithms responsible for the generation of pseudo-random values were implemented. A microphone and an accelerometer recorded sound and acceleration during the use of the prototype vest, and these recordings were passed to the seed generator and used as entropy sources. Hardware implementations were made for several selected Block Cryptographic algorithms such as Advanced Encryption Standard (AES), Twofish and 3DES. The random binary values generated by the wearable CSPRBG were analyzed by National Institute of Standards and Technology (NIST) statistical tests as well as ENT tests to evaluate their randomness, depending on the configuration of the entropy sources used. The idea of possible development of the wearable CSPRBG as a System on Chip (SoC) solution is also presented.
Funder
Poznan University of Technology
Subject
General Physics and Astronomy
Reference60 articles.
1. Corrigan-Gibbs, H., Mu, W., Boneh, D., and Ford, B. (2013, January 4–8). Ensuring high-quality randomness in cryptographic key generation. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany. 2. Dodis, Y., Guo, S., Stephens-Davidowitz, N., and Xie, Z. (2021, January 16–20). No time to hash: On super-efficient entropy accumulation. Proceedings of the Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event. 3. Gutterman, Z., Pinkas, B., and Reinman, T. (2006, January 21–24). Analysis of the Linux random number generator. Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P’06), Berkeley/Oakland, CA, USA. 4. Zhang, C., Shahriar, H., and Riad, A.K. (2020, January 13–17). Security and Privacy Analysis of Wearable Health Device. Proceedings of the 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain. 5. Awotunde, J.B., Jimoh, R.G., Folorunso, S.O., Adeniyi, E.A., Abiodun, K.M., and Banjo, O.O. (2021). The Fusion of Internet of Things, Artificial Intelligence, and Cloud Computing in Health Care, Springer.
|
|