On 5/25/2015 11:01 PM, Russell Leidich wrote:
As annouced here in the original Jytter blog:

http://jytter.blogspot.com

It has been a long 3 years since Jytter was released. Enranda is now available for download, analysis, and criticism. It's open source with awesome licensing terms, courtesy of Tigerspike:

http://tigerspike.com

Enranda is a cryptographically secure (in the postquantum sense) true random number generator requiring nothing but a timer (ideally, the CPU timestamp counter). It produces roughly 4 megabytes of noise per second, which puts it in the same bandwidth league as physical quantum dot entropy sources (from camera pixel noise). It would be easy to reach much higher bandwidths by reading the timer in a tight loop while feeding it into a PRNG, but probably not safely so. The documentation goes to considerable lengths to explain this assertion.

If you can demonstrate that Enranda is biased in a measurable way, or simply buggy, then you rock.

You can get the commandline demo, the documentation, and even a text capture of the live demo at:

http://enranda.blogspot.com

By the way, Enranda's hardness is based in part on Dyspoissometer, a new statistical analysis package focussed on measuring dyspoissonism, that is, the extent to which a discrete set deviates from what we would asymptotically consider to be a Poisson distribution. You can get the demo, the documentation, and a demo capture at:

http://dyspoissonism.blogspot.com

May your ideas be random!

Russell Leidich



_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography
Are we talking about entropy taken from hard drive turbulence, the keyboard or mouse, heat decay, or what?

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to