[Cryptography] Duh, why aren't most embedded TRNGs designed this way?

Richard Outerbridge outer at interlog.com
Thu Apr 22 19:28:39 EDT 2021


Ever checked out ( https://leetronics.de/en/shop/infinite-noise-trng/ <https://leetronics.de/en/shop/infinite-noise-trng/>  ) ?

> On 2021-04-22 (112), at 14:23:28, Bill Cox <waywardgeek at gmail.com> wrote:
> 
> In short, use just 2 ring oscillators in an FPGA or ASIC, clocking 2 counters, one binary and one gray code, and use some clever software to (hopefully) securely estimate the entropy collected, avoiding the most common reasons for TRNG failures in embedded systems.
> 
> Either this design is in common use, but somehow I've missed it, in which case I'm a dork, or this design doesn't work, in which case, I'm a dork.  Either way, I apologize for being such a dork.
> 
> TL; DR
> 
> <rant>

I didn’t see a <rant off> directive :)
__outer

/ps it’s pretty neat, even if a little old.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20210422/621a3609/attachment.htm>


More information about the cryptography mailing list