TY - JOUR
T1 - A novel clock recovering circuit to thwart clock glitch attacks on ring-oscillator-based TRNGs in edge devices like sensors
AU - You, Chun Heng
AU - Tsai, Shuen Ming
AU - Chao, Paul C.P.
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.
PY - 2023/8
Y1 - 2023/8
N2 - A novel clock recovering circuit is proposed and successfully validated by this study for a TRNG to thwart effectively all types of clock glitch attacks, including upward and downward clock glitches. It is known that true random number generators (TRNGs) act a crucial role in the cryptographic hardware of many edge devices such as sensors, while data are transmitted over the fly. The TRNG provides random numbers for ephemeral key exchange, key derivation function, and countermeasures against side-channel attack on sensors. The most efficient way to implement a random number generator is to sample the timing jitter from ring oscillators. The sampling clock generally comes from either an off-chip clock pin or the output from an internal phase-locked loop. However, both suffer from the threats of clock glitch injection attack. This study designs and validates successfully a novel clock recovering circuit in a digital ring-oscillator-based TRNG via field programmable gate array (FPGA). The clock recovering circuit is capable of recovering the glitch-injected clock to TRNG back to normal to thwart attacks. This designed circuit is composed of standard logic cells, being able to recover the clock from both upward clock glitch and downward clock glitch, with the resulting entropy restored to the originally expected level. With the property of synthesizable and low-cost, it is a favorable solution for IoT edge devices such as sensors to keep the quality of TRNG from the attack of clock glitch attacks.
AB - A novel clock recovering circuit is proposed and successfully validated by this study for a TRNG to thwart effectively all types of clock glitch attacks, including upward and downward clock glitches. It is known that true random number generators (TRNGs) act a crucial role in the cryptographic hardware of many edge devices such as sensors, while data are transmitted over the fly. The TRNG provides random numbers for ephemeral key exchange, key derivation function, and countermeasures against side-channel attack on sensors. The most efficient way to implement a random number generator is to sample the timing jitter from ring oscillators. The sampling clock generally comes from either an off-chip clock pin or the output from an internal phase-locked loop. However, both suffer from the threats of clock glitch injection attack. This study designs and validates successfully a novel clock recovering circuit in a digital ring-oscillator-based TRNG via field programmable gate array (FPGA). The clock recovering circuit is capable of recovering the glitch-injected clock to TRNG back to normal to thwart attacks. This designed circuit is composed of standard logic cells, being able to recover the clock from both upward clock glitch and downward clock glitch, with the resulting entropy restored to the originally expected level. With the property of synthesizable and low-cost, it is a favorable solution for IoT edge devices such as sensors to keep the quality of TRNG from the attack of clock glitch attacks.
UR - http://www.scopus.com/inward/record.url?scp=85153483393&partnerID=8YFLogxK
U2 - 10.1007/s00542-023-05450-9
DO - 10.1007/s00542-023-05450-9
M3 - Article
AN - SCOPUS:85153483393
SN - 0946-7076
VL - 29
SP - 1137
EP - 1145
JO - Microsystem Technologies
JF - Microsystem Technologies
IS - 8
ER -