From: jmorton123 on 20 Jan 2010 11:50 Nine years ago I used to frequent this group regularly. On 9/11 I took down my site. To cut to the chase: Everyone knows that the key (pun intended) to encryption security is having a source of random numbers. True random number generators have been discussed often enough. I've made available on my website several basic random number utility programs all of which are freeware. One is a true random number generator. Of course to implement a true random number generator you must have a random source phenomenon. That's where you come in: YOU are the random source. Here's how it works in a nutshell: When you start the program it saves the system time. Each time you click the mouse or press the enter key, the time is once again stored. Then the start time is subtracted from the mouse click time. Then this difference is used to access an array that contains the binary numbers from 0 - 255. So with each click the time difference will continuously vary and thus the array access will continuously vary and the generated number will continuously vary. I recommend that you vary your click rate perhaps by varying which fingers you use and by changing up between the mouse click and the enter key press. Some of the other utilities available may be useful to you for general purposes such as a utility that reads a binary file and exports the same file in character format. Or a utility that will append one file to a second file. Or a utility that will XOR any one file with another. Again, all of these utilities are freeware and there is nothing for sale on the website. Just click and download. Here's the URL: http://www.kingkonglomerate.com Detailed instructions of each utility program are on the download page and included within each freeware program.
From: unruh on 20 Jan 2010 12:00 On 2010-01-20, jmorton123 <jmorton123(a)rock.com> wrote: > Nine years ago I used to frequent this group regularly. On 9/11 I > took down my site. To cut to the chase: > > Everyone knows that the key (pun intended) to encryption security is > having a source of random numbers. True random number generators have > been discussed often enough. > > I've made available on my website several basic random number utility > programs all of which are freeware. One is a true random number > generator. Of course to implement a true random number generator you > must have a random source phenomenon. That's where you come in: YOU > are the random source. Here's how it works in a nutshell: > > When you start the program it saves the system time. Each time you > click the mouse or press the enter key, the time is once again > stored. Then the start time is subtracted from the mouse click time. > Then this difference is used to access an array that contains the > binary numbers from 0 - 255. That does nothing for the randomness. That time is liable to have large biases in it, that this will not eliminate, > > So with each click the time difference will continuously vary and thus > the array access will continuously vary and the generated number will > continuously vary. I recommend that you vary your click rate perhaps > by varying which fingers you use and by changing up between the mouse > click and the enter key press. I sure would not trust this to deliver random numbers with very high entropy. What you need to do is to analyse the generators so as to be able to estimate their "randomness". > > Some of the other utilities available may be useful to you for general > purposes such as a utility that reads a binary file and exports the > same file in character format. Or a utility that will append one file > to a second file. Or a utility that will XOR any one file with > another. Again, all of these utilities are freeware and there is > nothing for sale on the website. Just click and download. > > Here's the URL: http://www.kingkonglomerate.com Detailed > instructions of each utility program are on the download page and > included within each freeware program.
From: William Ahern on 20 Jan 2010 12:24 unruh <unruh(a)wormhole.physics.ubc.ca> wrote: <snip> > What you need to do is to analyse the generators so as to be able to > estimate their "randomness". Here's a simple solution for an entropy source, independently verifiable by any layman. http://www.blackcatsystems.com/GM/products/GM10GeigerCounter.html https://unitednuclear.com/index.php?main_page=index&cPath=2_5
From: unruh on 20 Jan 2010 12:51 On 2010-01-20, William Ahern <william(a)wilbur.25thandClement.com> wrote: > unruh <unruh(a)wormhole.physics.ubc.ca> wrote: ><snip> >> What you need to do is to analyse the generators so as to be able to >> estimate their "randomness". > > Here's a simple solution for an entropy source, independently verifiable by > any layman. Actually no, it is hard to independently verifiable. For all you know the "geiger counter" just puts out a pseudo random stream of clicks. > > http://www.blackcatsystems.com/GM/products/GM10GeigerCounter.html Geiger counters have problem with dead time. Thus the distribution is not a proper poisson distribution. And you always have problem with biases with physical sources. Making sure you have a good estimate of the true randomness is hard is you take it seriously. > https://unitednuclear.com/index.php?main_page=index&cPath=2_5 >
From: Dave -Turner on 20 Jan 2010 13:50
i take it you haven't actually tested it against Diehard (etc) :) |