EM Information Security Threats Against RO-Based TRNGs: The Frequency Injection Attack Based on IEMI and em Information Leakage

Saki Osuka, Daisuke Fujimoto, Yu-Ichi Hayashi, Naofumi Homma, Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)

Abstract

True random number generators (TRNGs) based on ring oscillators (ROs) are employed in many devices because they can be constructed with a simple circuit structure. Many systems are affected if an RO-based TRNG is attacked, and its security is degraded. Conventional attacks against RO-based TRNGs reduce randomness using direct physical access to the target device and/or modification/invasion of the device or the equipment on which it is implemented. However, depending on the physical location of the device and its tamper resistance measures, directly accessing the device or operating/modifying the implementation may not be easy. This study introduces a noninvasive attack against RO-based TRNGs. In this attack, we intentionally induce sinusoidal electromagnetic waves in a TRNG and estimate the change in its randomness under this interference by observing the signal leaked from the TRNG from a distance. We also consider countermeasures against noninvasive attacks on TRNGs.

Original languageEnglish
Article number8393451
Pages (from-to)1122-1128
Number of pages7
JournalIEEE Transactions on Electromagnetic Compatibility
Volume61
Issue number4
DOIs
Publication statusPublished - 2019 Aug

Keywords

  • Electromagnetic (EM) information leakage
  • intentional electromagnetic interference (IEMI)
  • true random number generator (TRNG)

ASJC Scopus subject areas

  • Atomic and Molecular Physics, and Optics
  • Condensed Matter Physics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'EM Information Security Threats Against RO-Based TRNGs: The Frequency Injection Attack Based on IEMI and em Information Leakage'. Together they form a unique fingerprint.

Cite this