background preloader

Random Number

Facebook Twitter

Researchers can slip an undetectable trojan into Intel’s Ivy Bridge CPUs. Scientists have developed a technique to sabotage the cryptographic capabilities included in Intel's Ivy Bridge line of microprocessors. The technique works without being detected by built-in tests or physical inspection of the chip. The proof of concept comes eight years after the US Department of Defense voiced concern that integrated circuits used in crucial military systems might be altered in ways that covertly undermined their security or reliability.

The report was the starting point for research into techniques for detecting so-called hardware trojans. But until now, there has been little study into just how feasible it would be to alter the design or manufacturing process of widely used chips to equip them with secret backdoors. In a recently published research paper, scientists devised two such backdoors they said adversaries could feasibly build into processors to surreptitiously bypass cryptographic protections provided by the computer running the chips. Random number generation. A random number generator (RNG) is a computational or physical device designed to generate a sequence of numbers or symbols that can not be reasonably predicted better than by a random chance. Various applications of randomness have led to the development of several different methods for generating random data, of which some existed since ancient times, including dice, coin flipping, the shuffling of playing cards, the use of yarrow stalks (by divination) in the I Ching, and many other techniques.

Because of the mechanical nature of these techniques, generating large numbers of sufficiently random numbers (important in statistics) required a lot of work and/or time. Thus, results would sometimes be collected and distributed as random number tables. Nowadays, after the advent of computational random number generators, a growing number of government-run lotteries, and lottery games, are using RNGs instead of more traditional drawing methods. Practical applications and uses[edit]

RANDOM.ORG - True Random Number Service. RANDOM.ORG - True Random Number Service. Lottery Quick Pick. <p style="background-color:#ffff90;padding: 0em .5em 0em .5em;font-size:.9em"><strong>Warning:</strong> Your browser does not support JavaScript &#8211; RANDOM.ORG may not work as expected</p> Do you own an iOS or Android device? Check out our app! This form allows you to quick pick lottery tickets.

The randomness comes from atmospheric noise, which for many purposes is better than the pseudo-random number algorithms typically used in computer programs. You must <a href=" JavaScript</a> in your web browser before this form will work. If your lottery is not listed, pick any country, then select ‘Other Lottery’ and fill in the other fields. JebteK/RdRand: Library to use Intel's Secur... - GitHub. RdRand. The random number generator is compliant with security and cryptographic standards such as NIST SP 800-90A,[5] FIPS 140-2, and ANSI X9.82.[2] Intel also requested Cryptography Research Inc. to review the random number generator in 1999 and 2012, which resulted in two published papers: The Intel Random Number Generator in 1999,[6] and Analysis of Intel's Ivy Bridge Digital Random Number Generator in 2012.[7] Overview[edit] The CPUID instruction can be used to check whether the central processing unit (CPU) supports the RDRAND instruction on both AMD and Intel CPUs.

If supported, bit 30 of the ECX register is set after calling CPUID standard function 01H.[10] AMD processors are checked for the feature using the same test.[11] RDSEED availability can be checked on Intel CPUs in a similar manner. If RDSEED is supported, the bit 18 of the EBX register is set after calling CPUID standard function 07H. Reception[edit] See also[edit] Notes[edit] References[edit] External links[edit] True Random Numbers - What is Intel® Secure Key Technology? Introduction: Intel® Secure Key, was previously code-named Bull Mountain Technology.

It is the Intel® name for the Intel® 64 and IA-32 Architectures instruction RDRAND and its underlying Digital Random Number Generator (DRNG) hardware implementation. Among other things, the DRNG using the RDRAND instruction is useful for generating high-quality keys for cryptographic protocols. Because this technology recently launched (May 2012) with the Intel® 3rd Generation Core™ processors (code-named Ivy Bridge) the Bull Mountain Software Implementation Guide has been renamed to the Intel® Digital Random Number Generator Software Implementation Guide.

About the Intel® DRNG Software Implementation Guide: This technology is documented and described in the Intel® Digital Random Number Generator Software Implementation Guide. Random Number Generator (RNG) Basics and Introduction to the DRNG. This Software Implementation Guide is designed to serve a variety of readers. Questions?