this post was submitted on 11 Nov 2024
46 points (100.0% liked)

technology

23303 readers
433 users here now

On the road to fully automated luxury gay space communism.

Spreading Linux propaganda since 2020

Rules:

founded 4 years ago
MODERATORS
 

Edit: I found it for $36 elsewhere. :D

you are viewing a single comment's thread
view the rest of the comments
[–] chickentendrils@lemmy.ml 19 points 2 days ago* (last edited 2 days ago) (1 children)

Yeah, not USB but in principle it's the same whether it's PCI or whatever. There's no way to prove an RNG is truly random really just have to rely on validating subsets of its output look random. NIST has published recommendations for sampling RNGs.

Here's the title:

A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

I don't think there's a real need unless it's regulated to need some dedicated HW RNG.

[–] TankieTanuki@hexbear.net 6 points 2 days ago (3 children)

Very precise answer, thank you.

How about a simple test to make sure it didn't break and start spitting out all zeroes. Read a few lines from /dev/random ?

[–] piccolo@hexbear.net 9 points 2 days ago

I might be wrong about this but my understanding is that on Linux you'd pipe the output of this in somewhere and tell the kernel to use it for entropy, and if it gets insufficient entropy it realizes this and starts producing random bits slower. So like normally the Linux kernel samples mouse movements for randomness, and so it makes more random bits the more you jiggle your mouse. These hardware RNGs are best used for headless servers that don't have as reliable entropy at their disposal.

[–] chickentendrils@lemmy.ml 5 points 2 days ago

Yeah as long as the setup for the device symlinked its device path to /dev/random or you did that yourself. Stuff I used had a Java SDK walter-breakdown