[cryptography] Enranda: 4MB/s Userspace TRNG

Russell Leidich pkejjy at gmail.com
Mon May 25 23:01:20 EDT 2015


As annouced here in the original Jytter blog:

http://jytter.blogspot.com

It has been a long 3 years since Jytter was released. Enranda is now
available for download, analysis, and criticism. It's open source with
awesome licensing terms, courtesy of Tigerspike:

http://tigerspike.com

Enranda is a cryptographically secure (in the postquantum sense) true
random number generator requiring nothing but a timer (ideally, the CPU
timestamp counter). It produces roughly 4 megabytes of noise per second,
which puts it in the same bandwidth league as physical quantum dot entropy
sources (from camera pixel noise). It would be easy to reach much higher
bandwidths by reading the timer in a tight loop while feeding it into a
PRNG, but probably not safely so. The documentation goes to considerable
lengths to explain this assertion.

If you can demonstrate that Enranda is biased in a measurable way, or
simply buggy, then you rock.

You can get the commandline demo, the documentation, and even a text
capture of the live demo at:

http://enranda.blogspot.com

By the way, Enranda's hardness is based in part on Dyspoissometer, a new
statistical analysis package focussed on measuring dyspoissonism, that is,
the extent to which a discrete set deviates from what we would
asymptotically consider to be a Poisson distribution. You can get the demo,
the documentation, and a demo capture at:

http://dyspoissonism.blogspot.com

May your ideas be random!

Russell Leidich
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20150526/da67bd10/attachment.html>


More information about the cryptography mailing list