X-Git-Url: http://info9.net/gitweb/?p=wiki.git;a=blobdiff_plain;f=tmarble%2Fposts%2FUSB_TRNG.mdwn;h=0bf4e26691eca75f3e4510f2852d673d04b3df61;hp=36e06761dbdb7735dd87ebb5ba01504d703c91e0;hb=HEAD;hpb=364ebeaeb25a3c939e5f4ba0fcf31d257720f9d4 diff --git a/tmarble/posts/USB_TRNG.mdwn b/tmarble/posts/USB_TRNG.mdwn index 36e0676..0bf4e26 100644 --- a/tmarble/posts/USB_TRNG.mdwn +++ b/tmarble/posts/USB_TRNG.mdwn @@ -11,24 +11,25 @@ Yesterday I had a blast presenting my talk to create a completely open hardware and Free software true random number generator. -I my talk I mention the rationale for gathering more entropy: -The Linux urandom boot-time entropy hole as described in +In my talk I mention the rationale for gathering more entropy: +*The Linux urandom boot-time entropy hole* as described in the paper -**[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole]**. +[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole]. I also mention some of the difficulty in assessing RNG quality for security applications as highlighted by Matthew Green in his blog post -**[How do you know if an RNG is working?][greenrng]**. +[How do you know if an RNG is working?][greenrng]. I've been lucky to work on this design with [Bdale Garbee][bdale] and [Keith Packard][keithp]. If you'd like to learn more you can... - * Download the presentation (see below) - * Check out the web page for [USB TRNG][usbtrng] - * Join us on IRC OFTC #altusmetrum - * Join the [trng mailing list][trng] + +* Download the presentation (see below) +* Check out the web page for [USB TRNG][usbtrng] +* Join us on IRC OFTC #altusmetrum +* Join the [trng mailing list][trng] Let [[me|/tmarble]] know if you'd like to get involved! @@ -42,8 +43,8 @@ Let [[me|/tmarble]] know if you'd like to get involved! [altusmetrum]: http://altusmetrum.org/ [bdale]: http://gag.com/bdale [keithp]: http://keithp.com/keithp -[trng]: http://altusmetrum.org/USBtrng/ -[usbtrng]: http://lists.gag.com/mailman/listinfo/trng +[trng]: http://lists.gag.com/mailman/listinfo/trng +[usbtrng]: http://altusmetrum.org/USBtrng/ [debvideo]: https://wiki.debconf.org/wiki/DebConf14/Videostream#Recordings [ehole]: https://factorable.net/weakkeys12.extended.pdf [greenrng]: http://blog.cryptographyengineering.com/2014/03/how-do-you-know-if-rng-is-working.html