background preloader

Random Number

Facebook Twitter

Researchers can slip an undetectable trojan into Intel’s Ivy Bridge CPUs. Scientists have developed a technique to sabotage the cryptographic capabilities included in Intel's Ivy Bridge line of microprocessors. The technique works without being detected by built-in tests or physical inspection of the chip. The proof of concept comes eight years after the US Department of Defense voiced concern that integrated circuits used in crucial military systems might be altered in ways that covertly undermined their security or reliability.

The report was the starting point for research into techniques for detecting so-called hardware trojans. But until now, there has been little study into just how feasible it would be to alter the design or manufacturing process of widely used chips to equip them with secret backdoors. In a recently published research paper, scientists devised two such backdoors they said adversaries could feasibly build into processors to surreptitiously bypass cryptographic protections provided by the computer running the chips. Random number generation. Producing a sequence that cannot be predicted better than by random chance Random number generation is a process by which, often by means of a random number generator (RNG), a sequence of numbers or symbols that cannot be reasonably predicted better than by random chance is generated.

This means that the particular outcome sequence will contain some patterns detectable in hindsight but impossible to foresee. True random number generators can be hardware random-number generators (HRNGs), wherein each generation is a function of the current value of a physical environment's attribute that is constantly changing in a manner that is practically impossible to model.

This would be in contrast to so-called "random number generations" done by pseudorandom number generators (PRNGs), which generate numbers that only look random but are in fact pre-determined—these generations can be reproduced simply by knowing the state of the PRNG.[1] Practical applications and uses[edit] Generation methods[edit]

Lottery Quick Pick. <p style="background-color:#ffff90;padding: 0em .5em 0em .5em;font-size:.9em"><strong>Warning:</strong> Your browser does not support JavaScript &#8211; RANDOM.ORG may not work as expected</p> Do you own an iOS or Android device? Check out our app! This form allows you to quick pick lottery tickets. The randomness comes from atmospheric noise, which for many purposes is better than the pseudo-random number algorithms typically used in computer programs. You must <a href=" JavaScript</a> in your web browser before this form will work. If your lottery is not listed, pick any country, then select ‘Other Lottery’ and fill in the other fields.

JebteK/RdRand: Library to use Intel's Secur... - GitHub. RdRand. The random number generator is compliant with security and cryptographic standards such as NIST SP 800-90A,[5] FIPS 140-2, and ANSI X9.82.[2] Intel also requested Cryptography Research Inc. to review the random number generator in 1999 and 2012, which resulted in two published papers: The Intel Random Number Generator in 1999,[6] and Analysis of Intel's Ivy Bridge Digital Random Number Generator in 2012.[7] Overview[edit] The CPUID instruction can be used to check whether the central processing unit (CPU) supports the RDRAND instruction on both AMD and Intel CPUs. If supported, bit 30 of the ECX register is set after calling CPUID standard function 01H.[10] AMD processors are checked for the feature using the same test.[11] RDSEED availability can be checked on Intel CPUs in a similar manner. If RDSEED is supported, the bit 18 of the EBX register is set after calling CPUID standard function 07H.

Reception[edit] See also[edit] Notes[edit] References[edit] External links[edit] True Random Numbers - RdRand.com. What is Intel® Secure Key Technology? Introduction: Intel® Secure Key, was previously code-named Bull Mountain Technology. It is the Intel® name for the Intel® 64 and IA-32 Architectures instruction RDRAND and its underlying Digital Random Number Generator (DRNG) hardware implementation. Among other things, the DRNG using the RDRAND instruction is useful for generating high-quality keys for cryptographic protocols. Because this technology recently launched (May 2012) with the Intel® 3rd Generation Core™ processors (code-named Ivy Bridge) the Bull Mountain Software Implementation Guide has been renamed to the Intel® Digital Random Number Generator Software Implementation Guide. About the Intel® DRNG Software Implementation Guide: This technology is documented and described in the Intel® Digital Random Number Generator Software Implementation Guide.

Random Number Generator (RNG) Basics and Introduction to the DRNG. This Software Implementation Guide is designed to serve a variety of readers. Questions?