True Random Number Generator Implemented in 130 NM CMOS Nanotechnology
True Random Number Generator Implemented in 130 NM CMOS Nanotechnology
Abstract—Random generators systems have the capacity to must be random, it does not matter how it is created, is
generate cryptographic keys which, when mixed with the in- it by software or hardware. The focus of this paper is the
formation, hide it in an efficient and timely manner. There development of an entropy source to generate random keys.
are two categories of RNG, being truly random (TRNG) or
pseudorandom (PRNG). To study the entropy source based on II. RNG S AND PUF S
the noise of an oscillator, and to achieve that, an RNG circuit was
designed to have a low power consumption, a high randomness One way to create random keys is by using a random
and a low cost and area usage. The chosen architecture for this number generator. These generators are based on algorithms
paper is a hybrid RNG, which uses oscillators and a chaotic and create a stream of bits which get processed, and a
circuit to generate the random bits. With the simulation of the
circuit, it was found to be at the objectives mark, having a low key is produced. There are two important tools to achieve
power consumption of 1.19 mW, a high throughput of 25 Mbit/s cryptographic security: RNGs and PUFs.
and an energy per bit of 47.6 pJ/bit. However, due to limitations
with the simulation, it wasn’t possible to run all the statistical A. Random Number Generators
tests, although all the ran tests were passed. There are two types of random number generators, ones
Index Terms—PRNG, TRNG, oscillator, chaotic, random, cryp-
tographic, information. that use the randomness of physical processes, true random
number generators (TRNG), and ones that use complex mathe-
matical algorithms, which are called pseudorandom generators
I. I NTRODUCTION
(PRNG). The latter are called pseudorandom because if the
Since the beginning of civilization, ways of communicating mathematical system and the initial conditions are known, it
between two or more interlocutors have been developed, which is possible to calculate the output of the system. This does not
raised a necessity to package the information shared, so it does happen on the TRNGs, which are truly random and impossible
not get shared with more than the interested parties without to replicate, even with the knowledge of the initial conditions.
compromising the contents of the information. That is what For instance, if we have a pseudorandom generator that works
we call cryptography nowadays. With the development of the with prime numbers, if we know where it started and how
internet, society’s dependency on technological systems grew many times it ran, with enough time, a computer can calculate
gradually, currently being the IoT (Internet of Things) the it. On the other hand, if we have a TRNG based on the
most used systems. These systems made possible to generate, possibility of an earthquake, even if we ran it at the same place,
access, share and store data related to personal, business it would never be the same. Usually, TRNG are hardware-
and enterprises in a fast and easy manner. This amount of based, needing to be well protected to physical attacks.
information shared raises the need to develop new and robust
cryptographic systems, to be able to secure the information on B. Noise
demand. This brings us to another problem: the more complex Randomness is the key to have a random output on an RNG
cryptographic systems get, the more energy it uses, and so, and, to achieve it, we must tap into an entropy source. The
the smaller the devices the less power it can give, reducing the noise of electrical circuits is, usually, a big drawback on the
options to secure the information. All these concerns drive the design of analog circuits, because it makes the circuit consume
objectives of the development of cryptographic systems, which power that is used to spoil the signal, and so spoiling the
are low area, low power consumption and high robustness. To information that the signal carries. In this work, the noise is a
understand how to develop cryptographic systems, we must very important part, due to its randomness. There are several
understand what it is. We have the information which gets types of noise, such as shot, flicker and jitter. The noise types
encrypted with a random key and transforms into the message which we take advantage of in this paper are the thermal
and gets sent to the recipient, getting decrypted with the noise and the jitter. Thermal noise is very present on high
same key, enabling the second party to access the readable frequency signals. This type is also known as 1/f 2 , because
information. The key to encrypt and decrypt the information it is influenced by the square of the frequency. This type of
53
Authorized licensed use limited to: Zhejiang University. Downloaded on April 22,2024 at 12:52:39 UTC from IEEE Xplore. Restrictions apply.
Vdd
Vin Vout
C1 R1
C C
Vin
MP MP
Vout- Vout+
D1 D2
R Vin+ Vin- R
MN MN
RL
Fig. 3. Proposed delay cell for the clock. Fig. 5. Proposed chaos cell for the free running oscillator.
54
Authorized licensed use limited to: Zhejiang University. Downloaded on April 22,2024 at 12:52:39 UTC from IEEE Xplore. Restrictions apply.
TABLE IV
S IMULATED VALUES OF POWER , AREA , THROUGHPUT AND ENERGY PER
BIT OF THE DESIGNED CIRCUIT
Designed circuit
Power (mW) 1.19
Area (µm) 66
Throughput (M bits/s) 25
Energy per bit (pJ/bit) 47.6
D1 D2
RL
C1 R1
D1 D2 D Q
Clk
RL
C1 R1
D1 D2
RL
C1 R1
D1 D2
Fig. 9. Jitter from a single pair of fast oscillators.
C1 R1
RL
D1 D2
RL
C1 R1
D1 D2 D Q
Vout
We can see that there is a significant improvement by adding
Clk
RL
55
Authorized licensed use limited to: Zhejiang University. Downloaded on April 22,2024 at 12:52:39 UTC from IEEE Xplore. Restrictions apply.
TABLE V
C OMPARISON OF STATISTICAL TESTS BETWEEN THE PROPOSED CIRCUIT AND THE STATE OF THE ART.
56
Authorized licensed use limited to: Zhejiang University. Downloaded on April 22,2024 at 12:52:39 UTC from IEEE Xplore. Restrictions apply.