[Cryptography] Duh, why aren't most embedded TRNGs designed this way?
Richard Outerbridge
outer at interlog.com
Thu Apr 22 19:28:39 EDT 2021
Ever checked out ( https://leetronics.de/en/shop/infinite-noise-trng/ <https://leetronics.de/en/shop/infinite-noise-trng/> ) ?
> On 2021-04-22 (112), at 14:23:28, Bill Cox <waywardgeek at gmail.com> wrote:
>
> In short, use just 2 ring oscillators in an FPGA or ASIC, clocking 2 counters, one binary and one gray code, and use some clever software to (hopefully) securely estimate the entropy collected, avoiding the most common reasons for TRNG failures in embedded systems.
>
> Either this design is in common use, but somehow I've missed it, in which case I'm a dork, or this design doesn't work, in which case, I'm a dork. Either way, I apologize for being such a dork.
>
> TL; DR
>
> <rant>
I didn’t see a <rant off> directive :)
__outer
/ps it’s pretty neat, even if a little old.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20210422/621a3609/attachment.htm>
More information about the cryptography
mailing list