Power Analysis of a Chaos-Based Random Number
Generator for Cryptographic Security
Fabio Pareschi,
∗†
Giuseppe Scotti,
‡
Luca Giancane,
‡
Riccardo Rovatti,
§†
Gianluca Setti
∗†
and Alessandro Trifiletti
‡
∗
ENDIF, University of Ferrara - via Saragat, 1 - 44100 Ferrara (ITALY)
†
ARCES, University of Bologna - via Toffano,2 - 40125 Bologna (ITALY)
‡
Dipartimento di Ingegneria Elettronica, Universit` a di Roma “La Sapienza” - Via Eudossiana 18, 00184 Roma (ITALY)
§
DEIS, University of Bologna - viale risorgimento, 2 - 40136 Bologna (ITALY)
email: {fabio.pareschi, gianluca.setti}@unife.it, rrovatti@arces.unibo.it,
{scotti, giancane, trifiletti}@die.uniroma1.it
Abstract—In this paper we consider a side-channel attack on a
chaos-based Random Number Generator (RNG) based on power
consumption analysis. The aim of this attack is to verify if it
is possible to retrieve information regarding the internal state
of the chaotic system used to generate the random bits. In fact,
one of the most common arguments against this kind of RNGs
is that, due to the deterministic nature of the chaotic circuit on
which they rely, the system cannot be truly unpredictable. Here
we analyze the power consumption profile of a chaos-based RNG
prototype we designed in 0.35 μm CMOS technology, showing
that for the proposed circuit the internal state (and therefore
the future evolution) of the system cannot be determined with
a side-channel attack based on a power analysis. This property
makes the proposed RNG perfectly suitable for high-security
cryptographic applications.
I. I NTRODUCTION
By definition, a Random Number Generator (RNG) is
a circuit capable of producing perfectly unpredictable bits,
which means that it is impossible to predict its outcome with
an accuracy greater than the one given by pure luck. These
circuits represent a fundamental primitive in many engineering
tasks. For instance they are used in all cryptographic applica-
tions where they are of paramount importance in the synthesis
of confidential keys. Indeed, it is commonly accepted that, in
any cryptographic system, a perfect randomly generated key
leads to the highest system security [1].
Testing unpredictability according to its definition is a hard
task, even from a theoretical point of view. In common prac-
tice, one can consider a generated (and supposed random) bit
sequence in order to validate the quality of a RNG, and check
it with a statistical test. Roughly speaking, this test analyzes
the bit sequence looking for regularities or recurrent patterns.
The outcome is the indication of whether the sequence can
be considered random, as well as the margin of error of this
decision [2].
In this paper we consider a prototype of a RNG designed
in 0.35 μm technology employing a chaotic map [3], [4]
as source of randomness. This prototype has been already
presented by authors in [5], where it has been tested using the
common statistical tests approach. Here we test the prototype
from another point of view: we consider, along with the
generated bitstream, the power consumption of the prototype,
and verify if this additional information can be used to predict
the future evolution of the RNG. This method is similar to the
power analysis technique, introduced by Kocher in 1999 [6],
to perform side channel attacks on cryptographic devices.
Note that this analysis represents an important issue for
any chaos-based random generator. A chaotic system is by
definition a deterministic, non-linear system with a long-term
unpredictability, i.e. its evolution cannot be predicted after a
short time interval, whose length decreases as the error in
the knowledge of the initial system state increases. Despite
this property, a common argument against this architecture is
the intrinsic deterministic nature of the system. Actually, if an
external observer could gather information on the internal state
of the chaotic map (which has to be, of course, inaccessible), a
prediction of the short-term evolution of the system is possible.
Even if it is possible to theoretically prove that, with the
architecture used in the prototype, the generated bitstream does
not contain information on the actual state of the chaotic map
[7], the possibility of retrieving this information from a side-
channel attack has not yet been analyzed.
We show here that a power analysis of the prototype is not
useful to obtain information on the internal state of the system,
since the current profile of the designed chaotic system is
independent of it. This effectively ensures the unpredictability
of the system even under a side-channel attack based on
power analysis, and it is perfectly suitable for chryptographic
applications.
The paper is organized as follows. In section II we describe
the architecture of the RNG prototype in order to understand
what is the expected current profile. In section III we analyze
the RNG power consumption, showing that no relation can be
found between the current profile and the internal state of the
chaotic map, thus ensuring the effective unpredictability of the
generated bitstream. Finally, we draw the conclusions.
II. ARCHITECTURE OF THE DESIGNED RNG
The RNG analyzed in this paper has been designed in a
3.3V0.35 μm CMOS technology. A detail microphotograph
of it can be seen in Figure 1. The core of this RNG is a
chaotic map, formally a 1D discrete-time dynamical system
whose state evolution is described by:
x
k
= M (x
k-1
) (1)
with M : I → I while the random output bit D
k
is given
through the quantization function Q : I →{0, 1} from the
state of the map:
D
k
= Q (x
k-1
)
978-1-4244-3828-0/09/$25.00 ©2009 IEEE 2858