4. Examples of truly random generators
TRNGs use physical sources of randomness with chaotic behavior (see 1.2 for a historical example). There are also TRNGs whose source of randomness is not totally physical (e.g. dice rolls, shuffling of playing cards, computer mouse movements, etc.). We are not interested in these devices, which are biased by human intervention.
Designing good TRNGs in integrated circuits requires mastery of various...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Software technologies and System architectures
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Examples of truly random generators
Bibliography
Software tools
DIEHARD: statistical test library proposed in 1995 by G. Marsaglia https://github.com/nmondal/diehard.c
DIEHARDER: statistical test library more comprehensive than DIEHARD and maintained by R. Brown since 2003 http://www.phy.duke.edu/rgb/General/dieharder.php
...Websites
L'ECUYER Pierre. Professional page (numerous publications, software and references on PRNG) http://www.iro.umontreal.ca/lecueyer
Page of a group of computer scientists and mathematicians working on the mathematical, testing and software aspects of PRNG. http://www.random.mat.sbg.ac.at/
...Events
CHES (Cryptographic Hardware and Embedded Systems) annual international conference since 1999. The reference in hardware cryptography with regular papers on RNG (TRNG and PRNG hardware). http://www.chesworkshop.org/
Annual CryptArchi (Cryptographic Architectures Embedded in Reconfigurable Devices) study days since 2003, mainly European....
Standards and norms
- Secure Hash Standard (SHS). Federal information processing standards (FIPS) http://www.csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf - FIPS 180-4 - 03-12
- Security Requirements for Cryptographic Modules. Federal information processing standards (FIPS) http://www.csrc.nist.gov/publications/fips/fips1401.htm - FIPS 140-1 - 01-94
- A Statistical Test Suite for Random and Pseudorandom Number Generators...
Patents
Parker (R.D.). – Telegraph ciphering key tape machine. US Patent 2 406 031 (1946).
Directory
Organizations – Federations – Associations (non-exhaustive list)
ANSSI: French National Agency for Information Systems Security http://www.ssi.gouv.fr/
BSI (Bundesamt für Sicherheit in der Informationstechnik ) : German Federal Office for Information Technology Security
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference