Well I don't want to name drop on the basis that no-one will really care, and if anyone does, I don't want to risk them getting spammed. You can google it. For what it's worth, I have no vested interest in Jytter, I don't stand to make any money from it (it's open source duh), or fame as I had nothing to do with its creation. I just know that in my professional career with various defence agencies, TRNG's were a big thing, and this one smashed every "test", be it die-hard, reflexive density, blah blah. And I've passed it to many reputable companies and universities who now use it. It can be slow, but it kicks ass.
Rather than me listing "names", why not just let it rip and run your own randomness tests on it? As with any TRNG, it will draft and deviate to the edges of Die-Hards etc etc and come back to the centre, as you'd expect... but judge for yourself. If you still think it sucks, go ahead and use get_random_number() or whatever, but "here" we've yet to find something better.... if only it was faster! :) Plus, yesterday it produced a "7", and we all know 7 is random. stu On Fri, Nov 21, 2014 at 10:10 AM, Dave Horsfall <d...@horsfall.org> wrote: > On Fri, 21 Nov 2014, Stu wrote: > > > Jytter does all of this and has been validated and proven by the worlds > > leading random number experts. Its been validated as a TRNG (not a PRNG) > > that operates in userspace. And its only 11 assembly language > > instructions. > > And just who would these experts be, exactly? > > -- > Dave Horsfall DTM (VK2KFU) "Bliss is a MacBook with a FreeBSD server." > http://www.horsfall.org/spam.html (and check the home page whilst you're > there) > _______________________________________________ > cryptography mailing list > cryptography@randombit.net > http://lists.randombit.net/mailman/listinfo/cryptography >
_______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography