I would like it to cost a little less than a wing from Boeing...
To increase cryptographic strength. I have several FreeBSD routers and they all contain corporate VPN network collectors. I would like to reduce the attack surface.Tell us what you need it for.
In principle, this is very nice, but a hardware generator, I believe, will always be two orders of magnitude more reliable.
Is there any clear example?Personally I would select the RNG matching your requirements and then write a driver if necessary. A device driver for an RNG is probably one of the easiest drivers one can write.
I believe that your salaries there have either increased significantly, or Boeings have become much cheaper...(afaik somewhere between 1k and 3k USD).
Try to undergo a transformation from an individual that "believes" to one that knows. Maybe you have readvery nice, but a hardware generator, I believe, will always be two orders of magnitude more reliable.
dev.bcmrng.0.stall_count: 10
dev.bcmrng.0.2xspeed: 0
dev.bcmrng.0.underrun: 0
dev.bcmrng.0.%parent: simplebus0
dev.bcmrng.0.%pnpinfo: name=rng@7e104000 compat=brcm,bcm2835-rng
dev.bcmrng.0.%location:
dev.bcmrng.0.%driver: bcmrng
dev.bcmrng.0.%desc: Broadcom BCM2835/BCM2838 RNG
dev.bcmrng.%parent:
I am quite ready to answer your question, and not so much for myself as for you, since I know the answer for myself. I will evaluate the generator using a fairly reliable tool - the Khinchin-Kholmogorov theorem. (Aka the Wiener-Khinchin-Einstein-Kholmogorov theorem). The existing module for the Matlab system will also help me a lot.Now try to answer yourself the question, how will you measure the reliability of a RNG? You need to do that and you need to know the method, because you need to test it especially when you buy a solution.
In principle, it is possible to somehow derive a certain weighted correlation coefficient, but I will be quite satisfied with a visual inspection of the constructed correlation distribution.You are talking about "magnitude more reliable". Try to put your "believed magnitude" in a number. You may learn rapidly on this matter.
Cool cat!
dont know if it has freebsd driver
Thank you. I'll watch it all.I think you want to think beyond the RNG and look at crypto acceleration as a whole.
I disagreee, but do appreciate that some random number generator appliances have the potential to be very reliable (e.g. those based on atomic decay). But they tend to be proprietary, and their design weaknesses may not be obvious, or even discernible, to independant assessment.a hardware generator, I believe, will always be two orders of magnitude more reliable.
I also saw a few, but if you don’t mind, please provide links to yours.There are a couple of open hardware RNGs available.
Any software generator produces not random, but pseudo-random numbers. And after a certain number of values it will inevitably begin to repeat itself. (Remember von Neumann's famous remark.)I disagreee, but do appreciate that some random number generator appliances have the potential to be very reliable
Well, open solutions have already been mentioned here. Especially if they are made in China and sold on Aliexpress. In this case, the malicious NSA is unlikely to be able to do anything. Only reptilians from the planet Nibiru.You are still trusting the hardware appliance, and, to my way of thinking, given what is known of the NSA and other, perhaps unknown, players, that is also a "sin".
I didn’t understand what phrase Schneier was talking about, but I looked at the second volume of Knuth. Nowhere does it say that this is a solution that allows you to get results approaching a hardware generator. It says that "This algorithm is a very pretty example of mathematical theory intimately interwoven with programming ingenuity - a fine illustration of the art of computer programming!" (p. 128). In general, Knut really liked his beauty. Not a word about correlation stability.I'd encourage you to read what Knuth (Algorithm M in "The Art of Computer Programming", Volume 2) and Schneier (in "Applied Cryptography") said about mitigating the deficiencies of pseudo random number generators for cryptographic use.
I believe that my privacy is always my privacy. And if we give it up for the sake of convenience, then, in the end, we will receive neither convenience nor privacy. Therefore, it doesn’t matter at all what I will protect - secret correspondence with a resident of Martian intelligence or an invitation to a barbecue of an unmarried young lady from a neighboring cottage (which in an hour she will tell all her friends about).Of course, if you have life threatening secrets to protect, I would trust none of the above...
Isn't the main "appeal" of an FRO based TRNG that it can be constructed without the need for "custom ICs"?I am an IC design engineer who specializes in designing TRNG. [...]. It mainly uses the jitter noise of the ring oscillator as the entropy source.
Thanks for your comment. And I will explain about that.Isn't the main "appeal" of an FRO based TRNG that it can be constructed without the need for "custom ICs"?
I'm not in the RNG business but my understanding as an EE is that FROs are commonly regarded as poor TRNG sources but interesting because of their ease of construction (no special or custom parts required).
Just to be clear: I don't mean to be complaining or "hating" - I assume that I have either a wrong or incomplete understanding of the subject - Hence I'm asking why an IC designer specialized in TRNGs would bother making a FRO based TRNG.
Does it work on FreeBSD? If not, why are you posting here?Recently I made a TRNG with 30Mbps throughput rate and it can be connected to PC using a USB interface. It mainly uses the jitter noise of the ring oscillator as the entropy source.