{"id":3982,"date":"2023-01-07T18:53:02","date_gmt":"2023-01-07T18:53:02","guid":{"rendered":"http:\/\/cad4security.org\/?page_id=3982"},"modified":"2023-07-10T14:08:59","modified_gmt":"2023-07-10T14:08:59","slug":"ch2_trng","status":"publish","type":"page","link":"http:\/\/cad4security.org\/index.php\/trainings\/hsl\/ch2_trng\/","title":{"rendered":"Chapter 2: True Random Number Generator (TRNG)"},"content":{"rendered":"\n<h2 class=\"is-style-subheading wp-block-heading\"><strong>Chapter 2<\/strong><\/h2>\n\n\n\n<h3 class=\"is-style-subheading wp-block-heading\" style=\"font-style:normal;font-weight:100\">True Random Number Generator (TRNG)<\/h3>\n\n\n\n<p>True random number generators (TRNGs) play a fundamental role in cryptographic systems. TRNGs are widely used in cryptographic applications such as key generation, random padding bits, and generation of challenges and nonces in authentication protocols. This chapter provides a basic understanding of multi-RO based TRNG design techniques in FPGAs, sources of randomness in TRNG output during measurement, how to create a technology-independent true random number generator (TI-TRNG) step by step and extract the random numbers on an FPGA board, and also presents ways to measure the quality of randomness of the generated true random numbers.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link button\" href=\"http:\/\/cad4security.org\/wp-content\/uploads\/Chapter02_TRNG.zip\">download chapter files<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Chapter 2 True Random Number Generator (TRNG) True random number generators (TRNGs) play a fundamental role in cryptographic systems. TRNGs are widely used in cryptographic applications such as key generation, random padding bits, and generation of challenges and nonces in authentication protocols. This chapter provides a basic understanding of multi-RO based TRNG design techniques in &hellip;<\/p>\n","protected":false},"author":6,"featured_media":2565,"parent":3964,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"acf":[],"_links":{"self":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3982"}],"collection":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/comments?post=3982"}],"version-history":[{"count":9,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3982\/revisions"}],"predecessor-version":[{"id":4612,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3982\/revisions\/4612"}],"up":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/pages\/3964"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media\/2565"}],"wp:attachment":[{"href":"http:\/\/cad4security.org\/index.php\/wp-json\/wp\/v2\/media?parent=3982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}