{"title":"A collision resistant deterministic random bit generator with fault attack detection possibilities","authors":"E. Böhl, Matthew Lewis, Klaus Damm","doi":"10.1109/ETS.2014.6847829","DOIUrl":null,"url":null,"abstract":"Deterministic random bit generators can be used for cryptographic operations. An important feature of the DREG is collision resistance in order to avoid the generation of the same output sequence for different seeds. Further features are reverse calculation resistance and fault attack detection, which can in our design be reached by the COSSMA approach (COmplete Set of State MAchines) in combination with the use of one way functions and code checkers respectively. In difference to the usual approaches utilizing hash functions and block ciphers the COSSMA approach grants inherent properties which simplify the detection of fault attacks and provide also protection against side channel attacks with very low overhead.","PeriodicalId":145416,"journal":{"name":"2014 19th IEEE European Test Symposium (ETS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 19th IEEE European Test Symposium (ETS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETS.2014.6847829","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Deterministic random bit generators can be used for cryptographic operations. An important feature of the DREG is collision resistance in order to avoid the generation of the same output sequence for different seeds. Further features are reverse calculation resistance and fault attack detection, which can in our design be reached by the COSSMA approach (COmplete Set of State MAchines) in combination with the use of one way functions and code checkers respectively. In difference to the usual approaches utilizing hash functions and block ciphers the COSSMA approach grants inherent properties which simplify the detection of fault attacks and provide also protection against side channel attacks with very low overhead.