Random Number Generation with Entropy Sources in the Graphics Processing Units

Article Preview

Abstract:

The random number generator (RNG) is indispensable to modern cryptography since cryptographic services make use of random numbers for deriving encryption keys or nonces in protocols for secure communication. Operating systems like Linux and Windows provide built-in random number generators which can be accessed by cryptographic modules and other processes. If the system fails to collect sufficient entropy from the operating environment, the output from the RNG is blocked or becomes less secure. In this paper, we propose a method providing sufficient entropy to RNGs using graphics processing units. By estimating run-time of the kernel function in GPU, we can gather noisy data with bias. After the distillation process, we obtain a binary sequence for entropy input to the deterministic part of RNG. Our scheme was implemented on the computing environments using NVIDIA’s GPU GTX 580 and GTX 610M.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1863-1868

Citation:

Online since:

December 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Gutterman Z, Pinkas B, and Reinman T 2006 Proc. of the 2006 IEEE Symp. on Security and Privacy pp.371-385

Google Scholar

[2] Dorrendorf L, Gutterman Z, and Pinkas B 2009 ACM Trans. Inf. Syst. Secur. 13, 1, Article 10

Google Scholar

[3] Barak B and Halevi S 2005 Proc. of the 12th ACM conf. on Computer and communications security pp.203-212

Google Scholar

[4] Kirk DB and Hwu WW 2010 Programming Massively Parallel Processors (Burlington, MA: Morgan Kaufmann)

Google Scholar

[5] NVIDIA 2012 GPU Computing Documentation http://developer.nvidia.com/

Google Scholar

[6] Yeom Y, Cho Y, and Yung M 2008 Proc. of the 2008 Int. Conf. on Multimedia and Ubiquitous Engineering. pp.271-275

Google Scholar

[7] Harrison O and Waldron J 2008 USENIX Security Symposium pp.195-210

Google Scholar

[8] Zafar F, Olano M, and Curtis A 2010 Proc. of the Conf. on High Performance Graphics

Google Scholar

[9] Young A and Yung M 2004 Malicious Cryptography: Exposing Cryptovirology (Indianapolis, IN: Wiley) pp.57-66

Google Scholar