X-Git-Url: http://info9.net/gitweb/?p=wiki.git;a=blobdiff_plain;f=tmarble%2Fposts%2FUSB_TRNG.mdwn;h=e238ec4bd53a55bf643dd5baa4dca69c3edc3df9;hp=cf5495cf1efc8954cf71b7c24661dbad42a68fcf;hb=5c88f54c7fece695b591e53c3f2241713db489f8;hpb=63d5df0d8c99d46bde21cc939e27693a30675838 diff --git a/tmarble/posts/USB_TRNG.mdwn b/tmarble/posts/USB_TRNG.mdwn index cf5495c..e238ec4 100644 --- a/tmarble/posts/USB_TRNG.mdwn +++ b/tmarble/posts/USB_TRNG.mdwn @@ -14,17 +14,18 @@ random number generator. I my talk I mention the rationale for gathering more entropy: The Linux urandom boot-time entropy hole as described in the paper -[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole]. +**[Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices][ehole]**. I also mention some of the difficulty in assessing RNG quality for security applications as highlighted by Matthew Green in his blog post -[How do you know if an RNG is working?][greenrng]. +**[How do you know if an RNG is working?][greenrng]**. I've been lucky to work on this design with [Bdale Garbee][bdale] and [Keith Packard][keithp]. If you'd like to learn more you can... + * Download the presentation (see below) * Check out the web page for [USB TRNG][usbtrng] * Join us on IRC OFTC #altusmetrum @@ -43,7 +44,7 @@ Let [[me|/tmarble]] know if you'd like to get involved! [bdale]: http://gag.com/bdale [keithp]: http://keithp.com/keithp [trng]: http://lists.gag.com/mailman/listinfo/trng -[usbtrng]: http://lists.gag.com/mailman/listinfo/trng +[usbtrng]: http://altusmetrum.org/USBtrng/ [debvideo]: https://wiki.debconf.org/wiki/DebConf14/Videostream#Recordings [ehole]: https://factorable.net/weakkeys12.extended.pdf [greenrng]: http://blog.cryptographyengineering.com/2014/03/how-do-you-know-if-rng-is-working.html