Font Size: a A A

The ASIC Implementation Of TPM RNG

Posted on:2008-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:L Y ZhouFull Text:PDF
GTID:2268360212976294Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the coming of Information Age, man kind’s desire for all sorts of information has increased tremendously. More people began to be concerned about the security of information. To protect information’s security, TCG(Trusted Computing Group) defined TPM(Trusted Platform Module), which can provide safety storage and encryption function. This module is one microcontroller based on TCG industry standard. This controller is used to store password, digital certificate and cipher keys, and provides security certification, encryption and network connection service.As one of the main modules of TPM, RNG produces seed data for cipher, decipherment and key generation. It provides the internal random source for TPM, and TPM uses these random values for nonces, key generation and randomness in signatures.With the information security is becoming more and more important, random number’s quality determines how probability one can gain the information what he want from the information system. However, today the most random numbers are produced from arithmetic. As a result of limitation of random number that generated from arithmetic, man begins to need true random number generator to guarantee information’s security. Considering the two facts, this paper comes up with a new method of random number generator based on the noise source of Phase Locked Loop(PLL). The method can provide good properties: true randomness and easy to implementation and system integration.
Keywords/Search Tags:RNG, PLL, randomness, statistic property, hash
PDF Full Text Request
Related items