[Cryptech Tech] Hardware entropy

Bernd Paysan bernd at net2o.de
Fri May 16 14:47:23 UTC 2014


Hi all,
Hi Peter Stuge (frequent LinuxTag booth neighbor),

Thanks to Heise, I got informed that you are working on a open+secure 
cryptochip.  Has anybody started with the entropy source yet?  I've several 
ideas how to create entropy on an FPGA, and I'd like to try them out...

The general structure of an entropy source would be: The source itself (using 
unreliable, self-timing, or instable configurations of the lookup tables, 
which probably requires some low-level entry, as the standard Verilog compiler 
might want to eliminate them...), which must have a raw access from the 
outside (to get and measure raw entropy, so we can be confident that it is 
good entropy), and a conditioner, which is a secure one-way function over the 
entropy bits (which makes measuring the entropy extremely hard, as the one-way 
function produces something that definitely looks like good entropy).

I'd prefer to use Keccak as conditioner, because that's a hash I have no 
doubts about.  There's a Keccak implementation on OpenCores.

For the protocol I'm designing, I want/need ed25519 (signatures+ecdh+keygen 
and revocation with derived keys), and Keccak for the hashes.  The thing 
should also have a keypad for PIN entry to unlock it.

-- 
Bernd Paysan
"If you want it done right, you have to do it yourself"
http://bernd-paysan.de/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL: <https://lists.cryptech.is/archives/tech/attachments/20140516/f52bf5e1/attachment.sig>


More information about the Tech mailing list