Skip to content
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
40 lines (38 sloc) 2.41 KB
amazon_s3_presentation_url amazon_s3_video_url author categories comments date image layout session_id session_track slideshare_presentation_url speakers title youtube_video_url tag
2018-09-16 09:00:00+00:00
featured file_name path
Security, IoT and Embedded, 96Boards
biography company job-title name speaker-image
Software Engineer
Sumit Garg
biography company job-title name speaker-image
"Currently working at Linaro where I am tech lead for the Support and Solutions Engineering team. This team provides a mixture of technical support (for developers), training and custom engineering services to Linaro members and our professional services customers. As part of my work at Linaro I have become a co-maintainer of the Linux kernel kgdb/kdb and backlight sub-systems. I am also heavily involved in the 96Boards activities at Linaro."
Tech lead - Support and Solutions Engineering
Daniel Thompson
YVR18-417:Struck entropy! Finding true randomness from sensor data

Generating random numbers is essential to cryptography and providing a source of true randomness is an important feature for modern systems. The kernel provides a software implementation but this often lacks sufficient entropy at critical points (especially at boot), is not trusted by components such as OP-TEE and an equivalent rarely exists in the small RTOSes that power the IoT. An alternative is a hardware TRNG but what if you are working on a system without one?

This session is a case study describing our work to bring a hardware TRNG to Developerbox. This platform did not include a TRNG peripheral so we had to find an alternative. We wrote an OP-TEE static Trusted Application (TA) to collect entropy using thermal noise from the on-chip thermal sensors. The data we got required conditioning to eliminate bias but with simple conditioning we were able to generate sequences of numbers that pass suitable fitness tests. We will also look at how we optimized entropy collection using secure timer interrupt to avoid busy loops.

You can’t perform that action at this time.