Well I don't want to name drop on the basis that no-one will really care,
and if anyone does, I don't want to risk them getting spammed. You can
google it. For what it's worth, I have no vested interest in Jytter, I
don't stand to make any money from it (it's open source duh), or fame as I
had nothing to do with its creation. I just know that in my professional
career with various defence agencies, TRNG's were a big thing, and this one
smashed every "test", be it die-hard, reflexive density, blah blah. And
I've passed it to many reputable companies and universities who now use
it.  It can be slow, but it kicks ass.

Rather than me listing "names", why not just let it rip and run your own
randomness tests on it? As with any TRNG, it will draft and deviate to the
edges of Die-Hards etc etc and come back to the centre, as you'd expect...
but judge for yourself. If you still think it sucks, go ahead and use
get_random_number() or whatever, but "here" we've yet to find something
better.... if only it was faster! :)

Plus, yesterday it produced a "7", and we all know 7 is random.

stu


On Fri, Nov 21, 2014 at 10:10 AM, Dave Horsfall <d...@horsfall.org> wrote:

> On Fri, 21 Nov 2014, Stu wrote:
>
> > Jytter does all of this and has been validated and proven by the worlds
> > leading random number experts. Its been validated as a TRNG (not a PRNG)
> > that operates in userspace. And its only 11 assembly language
> > instructions.
>
> And just who would these experts be, exactly?
>
> --
> Dave Horsfall DTM (VK2KFU)  "Bliss is a MacBook with a FreeBSD server."
> http://www.horsfall.org/spam.html (and check the home page whilst you're
> there)
> _______________________________________________
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
>
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to