ABSTRACT

With the rapid development of computer networks and wireless communications, information security becomes one of the major problems for effective use of information

technology. These problems can be solved by using cryptography. In many practical applications (e.g., large sensor networks) cryptographic primitives have to be implemented in a very cost effective way by using standard hardware components. In a cryptographic application where ultimate security is necessary, a True Random Number Generator (TRNG) is required. TRNGs are widely used for example as confi dential key generators for symmetric key crypto-systems (e.g., AES) and public-key ones (e.g., RSA, ECC). In some algorithms (e.g., digital signatures) or protocols (e.g., zero-knowledge), random numbers are intrinsic to the computation [1].