[Cryptech Tech] Dieharder test of Cryptech RNG data
Joachim Strömbergson
joachim at secworks.se
Mon Apr 13 13:16:49 UTC 2015
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Aloha!
Benedikt Stockebrand wrote:
> you should expect one to be weak on a regular run; it is most
> convenient to use "-Y 1" ("resolve ambiguity mode") and feed it as
> much data as needed to get a more decisive result; and don't forget
> to add a "-k 2" as per the man page as well. Problem then of course
> is that it may run out of test data...
Ok, thanks for the advice.
I'm dumping 100 GBytes of new data right now. I've talked with Fredrik
today about how to make it available publicly to allow as many as
possible to test our TRNG as well as entropy sources.
- --
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning.
========================================================================
Joachim Strömbergson Secworks AB joachim at secworks.se
========================================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
iQIcBAEBCAAGBQJVK8HBAAoJEF3cfFQkIuyNKdEQAIKYyRlJ5s/n0606wR4pcWl8
n55aqJ9V0dGBqp6Rebo6BCxHXjIaKV5PdelngnA8MrpHR0CrxnXXxEDJrmOUbcVR
2o0LyeXSlHdftkjpTT/i1sw/vMj0zP2izgZ9/4NrYH/y3tFEmiuPTW+MR1jovzyq
+Gl5ZtxUifJ+HqfzGE5lSqe20T64q6uUe5iVyCl6G1+v9llyWrjv4VWGPk7ahdGW
zLiP2efhZBfoXpusQwjocCrYPv3Q5ncBScx2QNacpPFCw51h8ERPgzq7p9HF3ukt
vaHq1trSeKxvPmsAwlmwxTBg36t35VnXxB9wQwwQ3CpktTHfJiWXKWkZweDrfsW4
V485Q2jhNEwaPpGWX/Z8cAaY4sOzeOVCx7Qd6m6B2TAYuZOTAfGEggHT+YX9wrle
c+ZOP4Co49yTzFlewsVOMrCcBf/TJ3Uqmkv+PuVpFk74zeVDfr5ND1qJYmB8Sqz2
gLZvIcL4dCoY0u89jlmtPymfKUR9/B8AMc6bl/YGqDnU3ugV04rMEAX5Jn3HLX+R
D7f4YMd7M1q8MR8DPJMg0CBBhLmyjOWgceq4pWOuRJ2oxgNX7eVSp7lYgeQNuXMQ
lUIX1kasMaIR/giAbbw1r5UwZZ4+rHOOhC8CfvfjfOtGEex9hLUMyBMcGMi80tYj
+IzWMyLmItf2OjNbi/1K
=UXul
-----END PGP SIGNATURE-----
More information about the Tech
mailing list