True Random Generators and Hidden Transfer of Keys

Most industrial automatic systems are remotely controlled, so the problem of protecting control information transmitted through an open channel is relevant. The use of cryptographic systems for security involves the ability to fast exchange system keys. In this paper, a new family of the true random key generators is proposed. The source of entropy for such random devices is the phenomenon of jittering in electronic circuits. Generators are built in the form of cascade schemes based on adders. We give the architectural solution for the synthesis of the generator that based on transition dynamics of such an appliance. The procedure for the hidden transfer of keys using those generators is discussed.

[1]  Jianhua Chen,et al.  Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[2]  Lida Xu,et al.  Internet of Things for Enterprise Systems of Modern Manufacturing , 2014, IEEE Transactions on Industrial Informatics.

[3]  Axel Sikora,et al.  Challenges and prospects of communication security in real-time ethernet automation systems , 2018, 2018 14th IEEE International Workshop on Factory Communication Systems (WFCS).

[4]  Nasser Jazdi,et al.  Approach to interconnect existing industrial automation systems with the Industrial Internet , 2016, 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA).

[5]  V. M. Kuznetsov,et al.  Markov model of a digital stochastic generator , 2008 .

[6]  Daniel E. Holcomb,et al.  Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.

[7]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[8]  Jae-Joon Kim,et al.  8.2 8Mb/s 28Mb/mJ robust true-random-number generator in 65nm CMOS based on differential ring oscillator with feedback resistors , 2017, 2017 IEEE International Solid-State Circuits Conference (ISSCC).

[9]  F. Y. Edgeworth I.—The Mathematical Method of Statistics , 1886 .

[10]  Debdeep Mukhopadhyay,et al.  An Improved DCM-Based Tunable True Random Number Generator for Xilinx FPGA , 2017, IEEE Transactions on Circuits and Systems II: Express Briefs.

[11]  Wolfgang Granzer,et al.  Security in Building Automation Systems , 2010, IEEE Transactions on Industrial Electronics.

[12]  R. Langmann,et al.  The WOAS project: Web-oriented Automation System , 2012, 2012 9th International Conference on Remote Engineering and Virtual Instrumentation (REV).

[13]  H. Anton,et al.  Elementary linear algebra : applications version , 2008 .

[14]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[15]  Rustam Latypov,et al.  A New Family of Controlled Ternary True Random Number Generators , 2018, 2018 IEEE East-West Design & Test Symposium (EWDTS).

[16]  Rustam Latypov,et al.  Asynchronous Linear Combinational Circuits as a Base for Programmable Logic Device. Binary and Ternary Cases , 2016 .

[17]  F. Gantmacher,et al.  Applications of the theory of matrices , 1960 .