[cryptography] Enranda: 4MB/s Userspace TRNG

Kevin kevinsisco61784 at gmail.com
Tue May 26 12:26:33 EDT 2015


On 5/25/2015 11:01 PM, Russell Leidich wrote:
> As annouced here in the original Jytter blog:
>
> http://jytter.blogspot.com
>
> It has been a long 3 years since Jytter was released. Enranda is now 
> available for download, analysis, and criticism. It's open source with 
> awesome licensing terms, courtesy of Tigerspike:
>
> http://tigerspike.com
>
> Enranda is a cryptographically secure (in the postquantum sense) true 
> random number generator requiring nothing but a timer (ideally, the 
> CPU timestamp counter). It produces roughly 4 megabytes of noise per 
> second, which puts it in the same bandwidth league as physical quantum 
> dot entropy sources (from camera pixel noise). It would be easy to 
> reach much higher bandwidths by reading the timer in a tight loop 
> while feeding it into a PRNG, but probably not safely so. The 
> documentation goes to considerable lengths to explain this assertion.
>
> If you can demonstrate that Enranda is biased in a measurable way, or 
> simply buggy, then you rock.
>
> You can get the commandline demo, the documentation, and even a text 
> capture of the live demo at:
>
> http://enranda.blogspot.com
>
> By the way, Enranda's hardness is based in part on Dyspoissometer, a 
> new statistical analysis package focussed on measuring dyspoissonism, 
> that is, the extent to which a discrete set deviates from what we 
> would asymptotically consider to be a Poisson distribution. You can 
> get the demo, the documentation, and a demo capture at:
>
> http://dyspoissonism.blogspot.com
>
> May your ideas be random!
>
> Russell Leidich
>
>
>
> _______________________________________________
> cryptography mailing list
> cryptography at randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
Are we talking about entropy taken from hard drive turbulence, the 
keyboard or mouse, heat decay, or what?

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20150526/95e829e2/attachment-0001.html>


More information about the cryptography mailing list