Dissertations / Theses on the topic 'Générateur de Nombres Aléatoires'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Générateur de Nombres Aléatoires.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Soucarros, Mathilde. "Analyse des générateurs de nombres aléatoires dans des conditions anormales d'utilisation." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00759976.
Full textEl, Haje Hussein Fida. "Tests statistiques sur les générateurs physiques de nombres aléatoires (TRNGs)." Aix-Marseille 1, 2007. http://www.theses.fr/2007AIX11018.
Full textStatistical tests related to the entropy estimation of a random source are widely used in testing of true random number generators (TRNGs,True Random Number Generators) intended for cryptographic applications. Namely, Maurer’s universal statistical test is nowadays viewed as a standard in this domain. Therefore, from a statistical viewpoint, this thesis is focused on further developments of entropy tests. It consists in three main parts : The design of a generic software tool called Genstar, Generic Statistical Test Architecture. Genstar consists in a collection of statistical tests for random number generators. This software is developed with the help of the objet oriented programming, thus providing a common interface enabling easy integration of new statistical tests in Genstar. The second important characteristic of Genstar is related to the problem of comparison of statistical tests. To compute the power of a given statistical test, Genstar is equipped with a family of statistical models of TRNGs. Improvements of Maurer’s test. To improve statistical characteristics of this test, we propose several approaches such as the m-spacing and the p-leave out methods. In the very core of these methods is a new interpretation of the Maurer test related to the maximum likelihood tests for the problem of uniformity testing. It’s well known that the standard Maurer test cannot detect long memory dependencies in the data. In order to overcome this difficulty, we propose two approaches. The first one, called (SD test), computes the distribution of distances between motifs in the data. The second approach called MaurerPP is based on the idea of the equivalence of motifs. This equivalence permits to reduce multiple motifs testing to one generic motif testing and resolves efficiently the problem of large blocks in the Maurer test. Standard normality of m-spacings entropy estimators under weaker assumptions on the probability density. The improvements of the Maurer test proposed in this thesis are essentially based on the m - spacing method in the entropy estimation. In this thesis, we show that under mild conditions on the probability density, i. E. For vanishing densities, the m-spacings entropy estimators have the standard Gaussian limit
Röck, Andrea. "Etudes quantitatives des générateurs de nombres (pseudo) aléatoires pour la cryptologie." Palaiseau, Ecole polytechnique, 2009. http://www.theses.fr/2009EPXX0014.
Full textAguilar, Angulo Julio Alexander. "Conception d'un générateur de valeurs aléatoires en technologie CMOS AMS 0.35µm." Thesis, Toulon, 2015. http://www.theses.fr/2015TOUL0012/document.
Full textRandom binary sequences generators constitute the essential part of a system Cryptographic. The speed, quality of generated suites, safety and consumption play an essential role in the selection of a generator. The security of the cryptographic system increases if such a system can be realized in a single circuit.The developed research work consists in the realization of a random number generator running in low power, low speed. The proposed circuit is analog and Valid all NIST tests ensuring the randomness of a signal.A realization on silicon in 0,35μm technology has been implemented and validated through NIST developed tests Matlab. In this thesis, a number of publications have demonstrated the added value search results
Roeck, Andrea. "Quantifications de la génération de nombres pseudo-aléatoires en cryptographie." Phd thesis, Ecole Polytechnique X, 2009. http://tel.archives-ouvertes.fr/tel-00428553.
Full textSantoro, Renaud. "Vers des générateurs de nombres aléatoires uniformes et gaussiens à très haut débit." Thesis, Université Laval, 2010. http://www.theses.ulaval.ca/2010/26804/26804.pdf.
Full textCherkaoui, Abdelkarim. "Générateurs de nombres véritablement aléatoires à base d'anneaux asynchrones : conception, caractérisation et sécurisation." Thesis, Saint-Etienne, 2014. http://www.theses.fr/2014STET4011/document.
Full textTrue Random Number Generators (TRNG) are ubiquitous in many critical cryptographic applications (key generation, DSA signatures, etc). While many TRNG designs exist in literature, only a few of them deal with security aspects, which is surprising considering that they are low-level primitives in a cryptographic system (a weak TRNG can jeopardize a whole cryptographic system). The objective of this thesis was to study the advantages of asynchronous design techniques in order to build true random number generators that are secure and robust. We especially focused on digital oscillators called self-timed rings (STR), which use a handshake request and acknowledgement protocol to organize the propagation of data. Using some of the unique properties of STRs, we propose a new TRNG principle, with a detailed theoretical study of its behavior, and an evaluation of the TRNG core in ASICs and FPGAs. We demonstrate that this new principle allows to generate high quality random bit sequences with a very high throughput (> 100 Mbit/s). Moreover, it enables a realistic estimation for the entropy per output bit (this entropy level can be tuned using the entropy extractor parameters). We also present a complete methodology to design the TRNG, to properly set up the architecture with regards to the level of noise in the circuit, and to secure it against attacks and failures
Haddad, Patrick. "Caractérisation et modélisation de générateurs de nombres aléatoires dans les circuits intégrés logiques." Thesis, Saint-Etienne, 2015. http://www.theses.fr/2015STET4008/document.
Full textRandom number generators (RNG) are primitives that produce independent and uniformly distributed digital values, RNG are used in secure environments where the use of random numbers is required (generation of cryptographic keys, nonces in cryptographic protocols, padding values, countermeasures against side-channel attacks) and where the quality of the randomness is essential. All electronic components with a security function, such as smart cards, include one or more random generators (based on physical principles). Consequently, the RNG is an essential primitive for security applications. A flaw in security of the random number generation process directly impacts the security of the cryptographic system. This thesis focuses on the study of physical RNG (PTRNG), the modeling of its randomness and an electronic characterizations of the circuit. This study is in the context of the AIS-31 standard which is published by the BSI* and followed by many European countries. This standard is one of the few that require a characterizations of the PTRNG and a stochastic model. In this context, it is crucial to validate the evaluation methodology proposed by these standards and l focused on them during my thesis.*Bundesamt fiir Sicherheit in der Informationstechnik, federal agency German responsible for the security of information technology
Santoro, Renaud. "Vers des générateurs de nombres aléatoires uniformes et gaussiens à très haut débit." Phd thesis, Université Rennes 1, 2009. http://tel.archives-ouvertes.fr/tel-00438600.
Full textSantoro, Renaud. "Vers des générateurs de nombres aléatoires uniformes et gaussiens à très haut débit." Phd thesis, Rennes 1, 2009. https://theses.hal.science/docs/00/44/56/84/PDF/these_santoro.pdf.
Full textGenerating truly random numbers (TRNG) produce independent random binary sequences, unpredictable and uniformly distributed. A TRNG is necessary in many applications (cryptography, telecommunications, computer simulations, testing,. . . ) and their hardware implementation in embedded system is a delicate task and critical in many systems. Evaluation of a TRNG is complex because the quality of the sequence is a function of the noise source used in the external environment and the location within the target circuit. A primary objective of this thesis was to propose an objective methodology for analyzing the quality of TRNG embedded in SoCs. However, despite the quality of the selected generator, the random output of the TRNG can vary in time due to possible external attacks on the circuit, the speed of change in external conditions or aging components. To improve the robustness of a TRNG, the use of statistical tests (AIS 31, FIPS, Diehard) allows to analyze in time and in real conditions the TRNG in the circuit with a limited cost and for speeds up to 140 Mbps. The online tests help to prevent malicious attacks, optimize throughput and eliminate defective sequences. Finally, a hybrid combining TRNG and PRNG at very high data rate has been implemented on a reconfigurable target and within a VLSI circuit. The study conducted on the RNG hybrid resulted in an industrial partnership with the company Smart-Quantum. A device for generating random variables following a Gaussian or Rayleigh has also been proposed. The quality and speed of the generator exceeds those of prior art, which allows to consider applications such as real-time simulation of radio propagation channels
Ben, Romdhane Molka. "Modélisation, implémentation et caractérisation de circuits générateurs de nombres aléatoires vrais pour la certification de crypto-processeurs." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0055/document.
Full textRandom numbers are required in numerous applications namely in cryptography where randomness is used in security protocols. There are two main classes of Random Number Generators (RNG) : The Pseudo RNG (PRNG) which have a deterministic sequence, and the True RNG (TRNG) which generates unpredictable random numbers. Cryptographic applications use both TRNG and PRNG. The PRNG needs an initial value, or seed, which can be the output of a TRNG. In digital technologies, like FPGAs, TRNG are commonly based on oscillators which have the drawback of being biased by harmonic coupling. In order to assess the entropic quality of TRNGs, standards based on statistical tests have been elaborated by certification organisms namely the NIST and the BSI. However, it is recommended to formalize the stochastic behaviour of the randomness generation process. In this Ph.D, we address the design and quality evaluation of TRNGs in digital circuits. We study of a low-cost digital TRNG without oscillators, hence robust against harmonics attacks. The proposed TRNG exploits both the metastability phenomenon and the jitter noise in CMOS digital flip-flops to generate the random numbers. A stochastic model of this TRNG has been formalized. This model describes the random generation process regardless of the targeted technology. The characterization and evaluation on a prototype circuit, in FPGA and ASIC technologies, has shown that the proposed TRNG architecture generates randomness of good quality and is robust against environmental variations
Ben, Romdhane Molka. "Modélisation, implémentation et caractérisation de circuits générateurs de nombres aléatoires vrais pour la certification de crypto-processeurs." Electronic Thesis or Diss., Paris, ENST, 2014. http://www.theses.fr/2014ENST0055.
Full textRandom numbers are required in numerous applications namely in cryptography where randomness is used in security protocols. There are two main classes of Random Number Generators (RNG) : The Pseudo RNG (PRNG) which have a deterministic sequence, and the True RNG (TRNG) which generates unpredictable random numbers. Cryptographic applications use both TRNG and PRNG. The PRNG needs an initial value, or seed, which can be the output of a TRNG. In digital technologies, like FPGAs, TRNG are commonly based on oscillators which have the drawback of being biased by harmonic coupling. In order to assess the entropic quality of TRNGs, standards based on statistical tests have been elaborated by certification organisms namely the NIST and the BSI. However, it is recommended to formalize the stochastic behaviour of the randomness generation process. In this Ph.D, we address the design and quality evaluation of TRNGs in digital circuits. We study of a low-cost digital TRNG without oscillators, hence robust against harmonics attacks. The proposed TRNG exploits both the metastability phenomenon and the jitter noise in CMOS digital flip-flops to generate the random numbers. A stochastic model of this TRNG has been formalized. This model describes the random generation process regardless of the targeted technology. The characterization and evaluation on a prototype circuit, in FPGA and ASIC technologies, has shown that the proposed TRNG architecture generates randomness of good quality and is robust against environmental variations
Baya, Abalo. "Contribution à la génération de vecteurs aléatoires et à la cryptographie." Phd thesis, Grenoble 1, 1990. http://tel.archives-ouvertes.fr/tel-00336536.
Full textHajjar, Mansour. "Construction d'un calculateur spécialisé pour le calcul de la conductivité électrique d'un réseau de résistances aléatoires." Paris 11, 1987. http://www.theses.fr/1987PA112409.
Full textA special purpose computer for the calculation of the electric conductivity of a random resistor network. The special purpose computer PERCOLA is designed for long numerical simulations on a percolation problem in Statistical Mechanics of disordered media. Our aim is to improve the actual values of the critical exponents characterizing the behavior of random resistance networks at percolation threshold. The architecture of PERCOLA is based on an efficient iterative algorithm used to compute the electric conductivity of such networks. The calculator has the characteristics of a general purpose 64- bit floating point microprogrammable computer that can run programs for various types of problems with a peak performance of 25 Mflops. This high computing speed is a result of the pipeline architecture based on internal parallelism and separately microcode controlled units such as: data memories, a microcode memory, ALUs and multipliers (both WEITEK components), various data paths, a sequencer (ANALOG DEVICES component), address generators and a random number generator. Thus, the special purpose computer runs percolation problem program 10 percent faster than the supercomputer CRAY XMP
François, Michaël. "Génération de nombres pseudo-aléatoires basée sur des systèmes multi-physiques exotiques et chiffrement d'images." Troyes, 2012. http://www.theses.fr/2012TROY0023.
Full textThe use of (pseudo)-random numbers has taken an important dimension in recent decades. Many applications in the field of telecommunications, cryptography, numerical simulations or gambling, have contributed to the development and the use of these numbers. The methods used for the generation of (pseudo)- random numbers are based on two types of processes: physical and algorithmic. In this PhD thesis, two classes of generators based on the principles of physical measurements and mathematical processes are presented. For each class two generators are presented. The first class of generators operates the response of a physical system that serves as a source for the generation of random sequences. This class uses both simulation results and the results of interferometric measurements to produce sequences of random numbers. The second class of generators is based on two types of chaotic functions and uses the outputs of these functions as an index permutation on an initial vector. This PhD thesis also focuses on encryption systems for data protection. Two encryption algorithms using chaotic functions are proposed. These algorithms use a permutation-substitution process on the bits of the original image. A thorough analysis based on statistical tests confirms the relevance of the developped cryptosystems in this PhD thesis manuscript
Zapalowicz, Jean-Christophe. "Sécurité des générateurs pseudo-aléatoires et des implémentations de schémas de signature à clé publique." Thesis, Rennes 1, 2014. http://www.theses.fr/2014REN1S103/document.
Full textIn this thesis, we are interested in the security of pseudorandom number generators and of implementations of signature schemes. Regarding the signature schemes, we propose, in the case of a widespread implementation of RSA, various fault attacks which apply to any padding function. In addition we present a proven secure infective countermeasure to protect the RSA--PSS scheme against some non-random faults. Furthermore we study the ECDSA scheme coupled with the GLV/GLS speed-up techniques. Depending on the implementations, we prove either the good distribution of the used nonce, or that it has a bias, thereby enabling an attack. Finally we develop a tool for automatically finding fault attacks given an implementation and a fault policy, which is successfully applied to some RSA and ECDSA implementations. Regarding pseudorandom number generators, we study the nonlinear ones and improve some attacks by reducing the information available to the adversary. We also are interested in the security of the Micali-Schnorr generator through various attacks and a statistical study of its security assumption. Finally we propose a cryptanalysis of any public-key scheme based on the factorization or the discrete logarithm when the secret key is generated using a linear generator
Allailou, Boufeldja. "Conception et évaluation des générateurs d'Aléa." Paris 8, 2010. http://octaviana.fr/document/158949269#?c=0&m=0&s=0&cv=0.
Full textPseudorandom number generators (PRNG) are the heart of many cryptographic schemes. Inappropriate generators can completely weaken the information systems which are mainly strong. In this thesis, we consider the random number generators for cryptography. First, we studied cryptographic generators based on feedback with Carry shift registers (FCSRs), introduced for the first time by A. Klapper and al. In 1993. On the other hand, cryptographically secure generators including the Dual Elliptic Curve pseudo-random number generator (DEC-PRNG) recently introduced and normalized by the NIST (SP 800-90). In 2005, for eSTREAM project, F. Arnault et al. Proposed a new family of stream ciphers based on filtered FCSRs, of which the F-FCSR-H v2 for hardware-oriented version. In the same context, we have developed a new design of FCSR-based vectorial approach, the VFCSRs. To implement this new concept, we designed and analyzed VFCSRs over F4 and we have proposed a new family of stream, the filtered Quadratic VFCSRs (F-VFCSR-Q). We have also developed particular stream cipher F-VFCSR-Q-H oriented hardware version. In 2007, in "Cryptanalysis of the Dual Elliptic Curve Pseudorandom generator", Berry Schoenmakers and al. Claimed that the DEC-PRNG could suffer from vulnerability because of the deviation from uniform law. We consider this problem of uniformity of the DEC-ECRNG outputs, and we propose a new testing procedure based on the Kolmogorov-Smirnov test for laws deviation. Results obtained by testing several samples invalidate the results obtained by B. Schoenmakers and al which still represented the principal fault of DEC-PRNG
Julis, Guenaëlle de. "Analyse d'accumulateurs d'entropie pour les générateurs aléatoires cryptographiques." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM075.
Full textWhile random numbers are frequently used in cryptography (seed, token, ...), news regurlarly prove how bad randomness generation can compromise the wole security of a protocol. Random number generators for crypthography are components with three steps : a source (an algorithm or physical phenomenon) produces raw numbers which are two times postprocessed to fix anomalies. This thesis focuses on the analysis of physical random bit generators in order to extract postprocessing which will be adapted to the anomalies of the source. As the design of a physical random bit generator is complex, its evaluation is mainly a statistical analysis with hypothesis testing. However, the current standards (AIS31, FIPS140-2, Test U01, SP800) can not provide informations to characterize anomalies. Thus, this thesis adjust several tests and add a time analysis to identify and to make global and local anomalies explicit. A C library was developped, providing anomalies simulator and tools to apply statistical and time analysis results on random bit generators
Valtchanov, Boyan. "Générateurs de suites binaires vraiment aléatoires : modélisation et implantation dans des cibles FPGA." Phd thesis, Université Jean Monnet - Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00757007.
Full textMadau, Maxime. "A methodology to localise EMFI areas on Microcontrollers." Thesis, Montpellier, 2019. http://www.theses.fr/2019MONTS045.
Full textToday, security of embedded devices is put in the limelight with the increasing market share of both IoT and automotive.To ensure a proper level of security to its customer such embedded components must undergo pentesting either to obtain some certifications to address security market but also to avoid tarnishing the name of the firm in case of vulnerability.Amongst the various attack paths, one of most threatening is the voluntary violation of operation condition to induce a fault on a circuit.These faults are then used for privilege escalation or combined with statistic tools to recover cryptographic keys. This thesis focuses on the use of electromagnetic field to generate such faults, this medium being the one that offers the best trade-off between cost and accuracy.The efficiency of such family of attack has already been demonstrated in the literature. Yet fault injection techniques shared a common problem which root cause is the amount of parameter an evaluator has to tweaks to obtain a fault. Therefore, it is hard to state whether a target is protected against fault injection since evaluation is bounded in time, thus exhaustive search is not an option.Metrics or strategies should be defined to get the most out of up to date fault injection methods.This thesis is a first step towards defining such metrics, and proposed to tackle the space complexity of EM fault injection. In other words, according to the attack scenario we developed metrics or strategy relying on both experimentation and state of the art. The aims of those metrics/strategy being to reduce the space on the DUT that undergo electromagnetic emanation to the most likely to be faulted area.In a first part, a criterion based on a basic model of the coupling between the injection probes and the circuit as well as today fault model will be developed.This criterion is then analysed and a refinement is proposed.Yet fault injection could also be used to nullify countermeasure that disable some attack vectors. Most of those countermeasures have in common the use of a true random generator.Thence in a second part we evaluate the robustness of an up to date true random number generator against electromagnetic perturbation.From this analysis we derived which parts of true random number generator are more relevant to be targeted using electromagnetic waves
Bakiri, Mohammed. "Hardware implementation of a pseudo random number generator based on chaotic iteration." Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD014/document.
Full textSecurity and cryptography are key elements in constrained devices such as IoT, smart card, embedded system, etc. Their hardware implementations represent a challenge in terms of limitations in physical resources, operating speed, memory capacity, etc. In this context, as most protocols rely on the security of a good random number generator, considered an indispensable element in lightweight security core. Therefore, this work proposes new pseudo-random generators based on chaotic iterations, and designed to be deployed on hardware support, namely FPGA or ASIC. These hardware implementations can be described as post-processing on existing generators. They transform a sequence of numbers not uniform into another sequence of numbers uniform. The dependency between input and output has been proven chaotic, according notably to the mathematical definitions of chaos provided by Devaney and Li-Yorke. Following that, we firstly elaborate or develop out a complete state of the art of the material and physical implementations of pseudo-random number generators (PRNG, for pseudorandom number generators). We then propose new generators based on chaotic iterations (IC) which will be tested on our hardware platform. The initial idea was to start from the n-cube (or, in an equivalent way, the vectorial negation in CIs), then remove a Hamiltonian cycle balanced enough to produce new functions to be iterated, for which is added permutation on output . The methods recommended to find good functions, will be detailed, and the whole will be implemented on our FPGA platform. The resulting generators generally have a better statistical profiles than its inputs, while operating at a high speed. Finally, we will implement them on many hardware support (65-nm ASIC circuit and Zynq FPGA platform)
Bessac, Julie. "Sur la construction de générateurs aléatoires de conditions de vent au large de la Bretagne." Thesis, Rennes 1, 2014. http://www.theses.fr/2014REN1S067/document.
Full textThis work is aimed at constructing stochastic weather generators. These models enable to simulate artificially weather data that have statistical properties consistent with observed meteorology and climate. Outputs of these models are generally used in impact studies in agriculture or in ecology
Reuillon, Romain. "Simulations stochastiques en environnements distribués : application aux grilles de calcul." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2008. http://tel.archives-ouvertes.fr/tel-00731242.
Full textJallouli, Ons. "Chaos-based security under real-time and energy constraints for the Internet of Things." Thesis, Nantes, 2017. http://www.theses.fr/2017NANT4035/document.
Full textNowadays, due to the rapid growth of Internet of Things (IoT) towards technologies, the protection of transmitted data becomes an important challenge. The devices of the IoT are very constrained resource in terms of computing capabilities, energy and memory capacities. Thus, the design of secure, efficient and lightweight crypto-systems becomes more and more crucial. In this thesis, we have studied the problem of chaos based data security under real-time and energy constraints. First, we have designed and implemented three pseudo-chaotic number generators (PCNGs). These PCNGs use a weak coupling matrix or a high diffusion binary coupling matrix between chaotic maps and a chaotic multiplexing technique. Then, we have realized three stream ciphers based on the proposed PCNGs. Security performance of the proposed stream ciphers were analysed and several cryptanalytic and statistical tests were applied. Experimental results highlight robustness as well as efficiency in terms of computation time. The performance obtained in computational complexity indicates their use in real-time applications. Then, we integrated these chaotic stream ciphers within the real-time operating system Xenomai. Finally, we have measured the energy and power consumption of the three proposed chaotic systems, and the average computing performance. The obtained results show that the proposed stream ciphers can be used in practical IoT applications
Martinez, Florette. "Mathematical studies of arithmetical pseudo-random numbers generators." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS222.
Full textLinear pseudo-random numbers generators are easy to understand and to implement. The most famous of them is the Linear Congruential Generator. In the first part of this thesis we present this generator and the different key-recovering algorithms that have been designed against it since the seventies. Because this generator is simple, it have been used as a core part to design more complex and potentially cryptographically secure generators like the Permuted Congruential Generator (presented and attacked in chapter 3) and Trifork (presented and attacked in chapter 4). It can also be generalized as the Multiple Recursive Generator but most of the known algorithms can be straight forwardly adapted meaning that the generalization do not give much more security. Other linear pseudo-random number generators are based on computationally hard problems such as the Knapsack Generator and it variations, based on the Subset Sum Problem. The Fast Knapsack Generator is attacked in chapter 5 because of the resemblance it bears with the Linear Congruential Generator and the Elliptic Knapsack Generator is attacked in chapter 7. Arrow, described and attacked in chapter 8 is a pseudo-random number generator that mix linear and binary operations. It is very fast and simple to implement. But these binary and linear operations are to easy to revert and almost all the attacks presented in this chapter runs under twenty minutes on a standard laptop
Bayon, Pierre. "Attaques électromagnétiques ciblant les générateurs d'aléa." Thesis, Saint-Etienne, 2014. http://www.theses.fr/2014STET4003/document.
Full textNowadays, our society is using more and more connected devices (cellphones, transport or access card NFC debit card, etc.), and this trend is not going to reverse. These devices require the use of cryptographic primitives, embedded in electronic circuits, in order to protect communications. However, some attacks can allow an attacker to extract information from the electronic circuit or to modify its behavior. A new channel of attack, using electromagnetic waves is skyrocketing. This channel, compared to attacks based on LASER beam, is relatively inexpensive. We will, in this thesis, present a new attack, using electromagnetic waves, of a certain type of cryptographic primitive: the true random number generator. We will show that it is possible to extract sensitive information from the electromagnetic radiation coming from the electronic device. We will also show that it is possible to completly modify the behavior of the true random number generator using a strong electromagnetic field
Yang, Chunxiao. "Fractional chaotic pseudo-random number generator design and application to image cryptosystem." Electronic Thesis or Diss., Ecole centrale de Nantes, 2022. http://www.theses.fr/2022ECDN0063.
Full textChaotic systems have been employed to design pseudo-random number generators (PRNG) and applied to cryptosystems due to their promising features, such as randomness and sensitivity to initial conditions. The fractional chaotic systems, though muchless discussed than the classical integer order chaotic maps and systems, possess intriguing intricacy which can provide novelty, complexity, and extra secret keys to the Chaotic PRNG (CPRNG) design, which in turn enhance the security of the cryptosystem.This thesis investigated different numerical calculation approaches for fractional chaotic systems. A non-uniform gird calculationmethod with two different grid compositions was proposed to solve the 3D fractional chaotic systems numerically. The FractionalCPRNGs (FCPRNG), which meet the randomness and statistical requirements, were designed for the first time employing threedifferent fractional chaotic systems. In addition, a stream cipher and a block cipher based on DNA encoding and decoding methods were proposed and studied using the designed FCPRNGs. Both ciphers have been verified to be secure and reliable
Cornejo-Ramirez, Mario. "Security for the cloud." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE049/document.
Full textCryptography has been a key factor in enabling services and products trading over the Internet. Cloud computing has expanded this revolution and it has become a highly demanded service or utility due to the advantages of high computing power, cheap cost of services, high performance, scalability, accessibility as well as availability. Along with the rise of new businesses, protocols for secure computation have as well emerged. The goal of this thesis is to contribute in the direction of securing existing Internet protocols by providing an analysis of the sources of randomness of these protocols and to introduce better protocols for cloud computing environments. We propose new constructions, improving the efficiency of current solutions in order to make them more accessible and practical. We provide a detailed security analysis for each scheme under reasonable assumptions. We study the security in a cloud computing environment in different levels. On one hand, we formalize a framework to study some popular real-life pseudorandom number generators used in almost every cryptographic application. On the other, we propose two efficient applications for cloud computing. The first allows a user to publicly share its high-entropy secret across different servers and to later recover it by interacting with some of these servers using only his password without requiring any authenticated data. The second, allows a client to securely outsource to a server an encrypted database that can be searched and modified later
Petura, Oto. "True random number generators for cryptography : Design, securing and evaluation." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSES053.
Full textRandom numbers are essential for modern cryptographic systems. They are used as cryptographic keys, nonces, initialization vectors and random masks for protection against side channel attacks. In this thesis, we deal with random number generators in logic devices (Field Programmable Gate Arrays – FPGAs and Application Specific Integrated Circuits – ASICs). We present fundamental methods of generation of random numbers in logic devices. Then, we discuss different types of TRNGs using clock jitter as a source of randomness. We provide a rigorous evaluation of various AIS-20/31 compliant TRNG cores implemented in three different FPGA families : Intel Cyclone V, Xilinx Spartan-6 and Microsemi SmartFusion2. We then present the implementation of selected TRNG cores in custom ASIC and we evaluate them. Next, we study PLL-TRNG in depth in order to provide a secure design of this TRNG together with embedded tests. Finally, we study oscillator based TRNGs. We compare different randomness extraction methods as well as different oscillator types and the behavior of the clock jitter inside each of them. We also propose methods of embedded jitter measurement for online testing of oscillator based TRNGs
Oon, Shea Ming. "Construction des suites binaires pseudo-aléatoires." Nancy 1, 2005. http://docnum.univ-lorraine.fr/public/SCD_T_2005_0017_OON.pdf.
Full textThis thesis presents some constructions of pseudo-random sequences inspired by natural questions in number theory. We use two measures introduced by A. Sárközy et C. Mauduit to discuss some aspects of a priori testing of these sequences. They are the well-distribution measure and correlation measure of order k. On the one hand, thanks to a work of A. Weil, some Dirichlet characters give a large family of interesting examples of constructions. On the other hand, our study on a construction based on the distribution of the greatest prime factors do not supply any sufficiently exploitable estimate. However, we observe the bias on some congruence classes of prime factors. We also discuss some probability aspects of both measures. A brief history on the randomness is presented to help better comprehension, as well as some subjects in cryptology which are given in an appendix
Noumon, Allini Elie. "Caractérisation, évaluation et utilisation du jitter d'horloge comme source d'aléa dans la sécurité des données." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSES019.
Full textThis thesis, funded by the DGA, is motivated by the problem of evaluation of TRNG for applications with a very high level of security. As current standards such as AIS-31 are not sufficient for these types of applications, the DGA proposes a complementary procedure, validated on TRNG using ring oscillators (RO), which aims to characterize the source of randomness of TRNG in order to identify electronic noises present in it. These noises are manifested in the digital circuits by the clock jitter generated in the RO. They can be characterized by their power spectral density related to the time Allan variance which allows, unlike the standard variance which is still widely used, to discriminate these different types of noise (mainly thermal, flicker). This study was used as a basis for estimating the proportion of jitter due to thermal noise used in stochastic models describing the output of TRNG. In order to illustrate and validate the DGA certification approach on other principles of TRNG apart from RO, we propose a characterization of PLL as a source of randomness. We have modeled the PLL in terms of transfer functions. This modeling has led to the identification of the source of noise at the output of the PLL, as well as its nature as a function of the physical parameters of the PLL. This allowed us to propose recommendations on the choice of parameters to ensure maximum entropy. In order to help in the design of this type of TRNG, we also propose a tool to search for the non-physical parameters of the generator ensuring the best compromise between security and throughput
Gyarmati, Katalin. "Propriétés aléatoires des suites d'entiers." Nancy 1, 2005. http://docnum.univ-lorraine.fr/public/SCD_T_2005_0001_GYARMATI.pdf.
Full textThe generation of pseudorandom numbers plays an important role in many fields of mathematics and physics, in particular in the problems of cryptography. In 1997 C. Mauduit and A. Sárközy introduced new measures of pseudorandomness of binary sequences: the well-distribution measure and the correlation measure. In the second chapter of the thesis we define a further new measure of pseudorandomness: the symmetry measure. In the third chapter of the thesis we constructed a large family of pseudorandom sequences by using the discrete logarithm. The sequences in this construction have strong pseudorandom properties, but they can be generated very slowly. In the fourth chapter we will improve on this construction by replacing a sequence which can be generated faster. In the last two chapters of the thesis we study inequalities between the measures of pseudorandomness. Among others, a conjecture of C. Mauduit is proved
Mureddu, Ugo. "Génération d'aléa dans les circuits électroniques numériques exploitant des cellules oscillantes." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSES018.
Full textWith the sharp increase in the deployment and integration of the Internet of Things, one challenge is to ensure security with respect to privacy and trust issues. With billions of connected devices, there is a huge risk of unauthorized use or abuse. To protect from such risks, security mechanisms are neede for per-device authentication and authorization, integrated in early design stages. Thankfully, cryptographic functions allow ciphering of sensitive data, as well as per-device authentication and authorization since they guarantee confidentialify, authenticity, integrity and non-repudiation. In this context, physical random generator (random number generator TRNG and physical unclonable functions PUF) are particularly useful since they generate secret keys, random masks or unique identifiers. The robustness of the cryptographic functions stand by the quality of the physical random generators. For that, numbers provided by those generators must be entropic. Otherwise, keys used to cipher data could be broken and identifiers could be retrieved. That's why, it is necessary to study physical random generators. In this thesis, we provide a rigorous approach to implement TRNGs and PUFs in reconfigurable logic devices. After that, we integrate those generators in a complete system. We also propose an innovative approach to evaluate the quality of PUF by modeling their behavior prior to designing it. This should he!p designers anticipate PUF quality in term of randomness. We also realize a complete a study of two kind of threats on physical random generators using oscillating cells: the locking phenomena and the EM analysis
Bourgade, Paul. "À propos des matrices aléatoires et des fonctions L." Paris, ENST, 2009. http://tel.archives-ouvertes.fr/tel-00373735.
Full textA probabilistic view of the Keating Snaith conjecture, about the moments of the number theoretic L-functions, is given. Our method is also applied to models of particle systems with an asymetric repulsion. Finally, we give the mesoscopic fluctuations of the zeros of the Riemann zeta function, confirming the analogy with the statistics of eigenvalues of random matrices
Sutanto. "Sur la décroissance de la fonction de concentration de la somme de variables aléatoires indépendantes." Bordeaux 1, 2001. http://www.theses.fr/2001BOR12405.
Full textBazzi, Hussein. "Resistive memory co-design in CMOS technologies." Electronic Thesis or Diss., Aix-Marseille, 2020. http://www.theses.fr/2020AIXM0567.
Full textMany diversified applications (internet of things, embedded systems for automotive and medical applications, artificial intelligence) require an integrated circuit (SoC, System on Chip) with high-performance non-volatile memories to operate optimally. Although Flash memory is widely used today, this technology needs high voltage for programing operations and has reliability issues that are hard to handle beyond 18 nm technological node, increasing the cost of circuit design and fabrication. In this context, the semiconductor industry seeks an alternative non-volatile memory that can replace Flash memories. Among possible candidates (MRAM - Magnetic Random Access Memory, PCM - Phase Change Memory, FeRAM - Ferroelectric Random Access Memory), Resistive memories (RRAMs) offer superior performances on essential key points: compatibility with CMOS manufacturing processes, scalability, current consumption (standby and active), operational speed. Due to its relatively simple structure, RRAM technology can be easily integrated in any design flow opening the way for the development of new architectures that answer Von Neumann bottleneck. In this thesis, the main object is to show the integration abilities of RRAM devices with CMOS technology, using circuit design and electrical measurements, in order to develop different hybrid structures: non-volatile Static Random Access Memories (SRAM), True Random Number Generator (TRNG) and artificial neural networks
Abbas-Turki, Lokman. "Calcul parallèle pour les problèmes linéaires, non-linéaires et linéaires inverses en finance." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1055/document.
Full textHandling multidimensional parabolic linear, nonlinear and linear inverse problems is the main objective of this work. It is the multidimensional word that makes virtually inevitable the use of simulation methods based on Monte Carlo. This word also makes necessary the use of parallel architectures. Indeed, the problems dealing with a large number of assets are major resources consumers, and only parallelization is able to reduce their execution times. Consequently, the first goal of our work is to propose "appropriate" random number generators to parallel and massively parallel architecture implemented on CPUs/GPUs cluster. We quantify the speedup and the energy consumption of the parallel execution of a European pricing. The second objective is to reformulate the nonlinear problem of pricing American options in order to get the same parallelization gains as those obtained for linear problems. In addition to its parallelization suitability, the proposed method based on Malliavin calculus has other practical advantages. Continuing with parallel algorithms, the last point of this work is dedicated to the uniqueness of the solution of some linear inverse problems in finance. This theoretical study enables the use of simple methods based on Monte Carlo
Raynaud, de Fitte Paul. "Limite projective d'ensembles, d'espaces topologiques : intégration des ensembles aléatoires et loi des grands nombres." Montpellier 2, 1990. http://www.theses.fr/1990MON20288.
Full textMontreuil, Audrey. "Mariage et papillons : calcul multi-parties et schéma de Benes revisité." Versailles-St Quentin en Yvelines, 2006. http://www.theses.fr/2006VERS0045.
Full textThis thesis consists of two sections. Ln the first section, we study a particular case of a multiparty computation: the Marriage ProposaI' s Problem, or more formally the fair computation of the logical AND. We give an efficient protocol b modifying the solution of the Socialist Millionaires' Problem (equality between two integers) from Boudot, Schoenmaker and Traoré. We ex tend our protocol to the case of n players and to other Boolean functions. Ln the second section, we ar interested with the Benes scheme (composition of two schemes called "Butterfly") which gives, from random functions 0 n bits to n bits, a pseudo-random function of Zn bits to Zn bits. We have noticed that the proof of security given in th initial paper of Aiello and Venkatesan is not valid for aIl chosen plaintext attacks. We provide a detailed proof of security against adaptive chosen plaintext attacks when m«Z-(n(l-e», for aIl e>O, where m is the number of chosen messages
Vodenicarevic, Damir. "Rhythms and oscillations : a vision for nanoelectronics." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLS518/document.
Full textWith the advent of "artificial intelligence", computers, mobile devices and other connected objects are being pushed beyond the realm of arithmetic and logic operations, for which they have been optimized over decades, in order to process "cognitive" tasks such as automatic translation and image or voice recognition, for which they are not the ideal substrate. As a result, supercomputers may require megawatts to process tasks for which the human brain only needs 20 watt. This has revived interest into the design of alternative computing schemes inspired by the brain. In particular, neural oscillations that appear to be linked to computational activity in the brain have inspired approaches leveraging the complex physics of networks of coupled oscillators in order to process cognitive tasks efficiently. In the light of recent advances in nano-technology allowing the fabrication of highly integrable nano-oscillators, this thesis proposes and studies novel neuro-inspired oscillator-based pattern classification architectures that could be implemented on chip
Lalanne, Philippe. "Les réseaux de neurones formels et leurs réalisations optoélectroniques : génération optique de tableaux de nombres aléatoires." Paris 11, 1989. http://www.theses.fr/1989PA112240.
Full textTwo purposes concerning the field of neural networks research are investigated in this thesis. First, we study optical implementation of neural networks. We show that higher order models, i. E. Multineuron synapsis models, allow us to increase strongly the network capacity with respect to the number of stable stored states. Optical implementations of such models necessary suppose both optical interconnects and boolean logic gates built into matrices. We propose a general approach for these implementations. In our hybrid architecture, the strength of optics, linear transformation for massive interconnects and the strength of electronics, point nonlinearities are both used to advantage. In the second part, we use speckle as a fast binary random number arrays generator. A theoretical approach and experimental evidences show that this kind of random generator may be of interest for optoelectronic implementation of parallel stochastic algorithms
Lalanne, Philippe. "Les réseaux de neurones formels et de leurs réalisations optoélectroniques : génération optique de tableau de nombres aléatoires." Phd thesis, Université Paris Sud - Paris XI, 1989. http://pastel.archives-ouvertes.fr/pastel-00730634.
Full textMissié, Pascal. "Estimation de contours d'un processus ponctuel par des méthodes à pas aléatoire." Lille 1, 1996. http://www.theses.fr/1996LIL12039.
Full textEzzaki, Fatima. "Contributions aux problèmes de convergence des suites adaptées et des ensembles aléatoires." Montpellier 2, 1993. http://www.theses.fr/1993MON20093.
Full textMor, Stefano Drimon Kurz. "Analyse des synchronisations dans un programme parallèle ordonnancé par vol de travail. Applications à la génération déterministe de nombres pseudo-aléatoires." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM024/document.
Full textWe present two contributions to the field of parallel programming.The first contribution is theoretical: we introduce SIPS analysis, a novel approach to estimate the number of synchronizations performed during the execution of a parallel algorithm.Based on the concept of logical clocks, it allows us: on one hand, to deliver new bounds for the number of synchronizations, in expectation; on the other hand, to design more efficient parallel programs by dynamic adaptation of the granularity.The second contribution is pragmatic: we present an efficient parallelization strategy for pseudorandom number generation, independent of the number of concurrent processes participating in a computation.As an alternative to the use of one sequential generator per process, we introduce a generic API called Par-R, which is designed and analyzed using SIPS.Its main characteristic is the use of a sequential generator that can perform a ``jump-ahead'' directly from one number to another on an arbitrary distance within the pseudorandom sequence.Thanks to SIPS, we show that, in expectation, within an execution scheduled by work stealing of a "very parallel" program (whose depth or critical path is subtle when compared to the work or number of operations), these operations are rare.Par-R is compared with the parallel pseudorandom number generator DotMix, written for the Cilk Plus dynamic multithreading platform.The theoretical overhead of Par-R compares favorably to DotMix's overhead, what is confirmed experimentally, while not requiring a fixed generator underneath
Bouchet, Élodie. "Marches aléatoires en environnement aléatoire faiblement elliptique." Phd thesis, Université Claude Bernard - Lyon I, 2014. http://tel.archives-ouvertes.fr/tel-01057100.
Full textLesseni, Sylla. "Autour d'une conjecture de B. Gross relative à l'existence de corps de nombres de groupe de Galois non résoluble et ramifiés en un unique premier p petit." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2005. http://tel.archives-ouvertes.fr/tel-00012068.
Full textÀ travers ce travail, nous nous intéressons au cas des corps de nombres de degré n ≤ 9. Après quelques rappels généraux sur les outils utilisés, on présente les méthodes pratiques permettant de vérifier cette conjecture.
Les travaux de J. Jones ont montré que les corps de nombres de degré 5 et 6 vérifiant ces types de ramification ont tous un groupe de Galois résoluble.
Dans le cas du degré 7, S. Brueggeman a abouti au même résultat que le travail sus cité.
Nos travaux dans le cas des degrés 8 et 9 montrent que sous GRH ou de façon inconditionnelle, la ramification en 5 n'est pas possible. À l'issue des recherches numériques, les seules tables obtenues sont celles de la ramification en p = 2 en degré 8 et celles de la ramification en p = 3 en degré 9. Les corps obtenus ont tous un groupe de Galois résoluble, montrant ainsi que cette conjecture de B. Gross n'est pas vérifiée pour les corps de nombres de degré n ≤ 9.
Borot, Gaetan. "Quelques problèmes de géométrie énumérative, de matrices aléatoires, d'intégrabilité, étudiés via la géométrie des surfaces de Riemann." Phd thesis, Université Paris Sud - Paris XI, 2011. http://tel.archives-ouvertes.fr/tel-00625776.
Full textLazag, Pierre. "Déformations de Christoffel et loi des grands nombres pour des processus déterminantaux discrets." Thesis, Aix-Marseille, 2020. http://www.theses.fr/2020AIXM0134.
Full textThis thesis studies several aspects of classes of determinantal processes. In a first part, we introduce determinantal processes arising from the higher Landau levels in the unit disk. We give a precise asymptotic for the variance of the number of points inside a disk of which the radius tends to one -. In a second part, we introduce the Christoffel deformations of discrete orthogonal polynomial ensembles, by multiplying the underlying orthogonality measure by a positive polynomial. We prove that the Christoffel deformatons of the Charlier ensemble converge towards deformations of the discrete Bessel process ; we also establish that Christoffel deformations of the z-measures are determinantal point process with an explicit kernel ; we eventually prove that the Christoffel deformations of the non-degenerate z-measures converge to a modification of the process with the Gamma kernel. In the last part, we establish a law of large numbers for local patterns in random plane partitions, generalizing in dimension two a phenomenon that occurs for a class of one dimensional Schur measures
Es-Sahib, Aziz. "Espérances d'une variable aléatoire à valeurs dans un espace métrique." Rouen, 1998. http://www.theses.fr/1999ROUES037.
Full text