On 5/25/2015 11:01 PM, Russell Leidich wrote:
As annouced here in the original Jytter blog:
http://jytter.blogspot.com
It has been a long 3 years since Jytter was released. Enranda is now
available for download, analysis, and criticism. It's open source with
awesome licensing terms, courtesy of Tigerspike:
http://tigerspike.com
Enranda is a cryptographically secure (in the postquantum sense) true
random number generator requiring nothing but a timer (ideally, the
CPU timestamp counter). It produces roughly 4 megabytes of noise per
second, which puts it in the same bandwidth league as physical quantum
dot entropy sources (from camera pixel noise). It would be easy to
reach much higher bandwidths by reading the timer in a tight loop
while feeding it into a PRNG, but probably not safely so. The
documentation goes to considerable lengths to explain this assertion.
If you can demonstrate that Enranda is biased in a measurable way, or
simply buggy, then you rock.
You can get the commandline demo, the documentation, and even a text
capture of the live demo at:
http://enranda.blogspot.com
By the way, Enranda's hardness is based in part on Dyspoissometer, a
new statistical analysis package focussed on measuring dyspoissonism,
that is, the extent to which a discrete set deviates from what we
would asymptotically consider to be a Poisson distribution. You can
get the demo, the documentation, and a demo capture at:
http://dyspoissonism.blogspot.com
May your ideas be random!
Russell Leidich
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography
Are we talking about entropy taken from hard drive turbulence, the
keyboard or mouse, heat decay, or what?
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography