Technology

The Value of Natural Randomness

Natural Randomness now is the gold standard for random-number generation. Before the Internet came along, the computing industry used randomness mainly for numerical simulation problems, and for this purpose, a predictable PRNG was not only acceptable, but was preferable. With the Internet came e-commerce and networked gaming, both of which require an unpredictable randomness source.…

Read More

The Struggle for Secure WiFi in the era of the IoT and the Weakness of Pseudorandom Passwords

Introduction The importance of WiFi access for the majority of citizens in the modern world can hardly be overestimated. The expanding provision of internet access over the past two decades has turned something that was considered a luxurious whim into a profound dependence. In a sense, WiFi has changed our own culture. Whether it is…

Read More

Why Massive IoT Needs True Randomness for a Secure 5G Network

Introduction The importance of secure data encryption continuously increases with every device that joins a public network. In the emerging IoT these will exceed the usual computers, laptops, tablets or smartphones, adding many new targets and ports for malevolent parties to steal our private information. As a major channel for data transfer between the users…

Read More

True Randomness Can’t be Left to Chance: Why entropy is important for information security

Introduction and Motivation Cryptography is fundamentally important for securing data, whether that data is in transit over the internet or at rest on a storage device. In the past, cryptography relied on algorithms and codes that were kept secret. This, however, proved impractical when parties who did not know each other in advance wanted to…

Read More

Why Cryptofinance Needs Natural Randomness

As Bitcoin and other cryptocurrencies ramp up towards mass-market deployments, blockchain technology faces an under-appreciated technical challenge. In order to securely hold and transfer blockchain documents, all participants will need to create truly unguessable encryption keys. For this purpose, we’ve all come to rely on the random-number source that’s built into the Linux operating system.…

Read More