Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
40 lines (38 sloc) 2.41 KB
amazon_s3_presentation_url amazon_s3_video_url author categories comments date image layout session_id session_track slideshare_presentation_url speakers title youtube_video_url tag
connect
yvr18
true
2018-09-16 09:00:00+00:00
featured file_name path
true
YVR18-417.png
/assets/images/featured-images/YVR18-417.png
resource-post
YVR18-417
Security, IoT and Embedded, 96Boards
None
biography company job-title name speaker-image
""
Linaro
Software Engineer
Sumit Garg
SumitGarg.jpg
biography company job-title name speaker-image
"Currently working at Linaro where I am tech lead for the Support and Solutions Engineering team. This team provides a mixture of technical support (for developers), training and custom engineering services to Linaro members and our professional services customers. As part of my work at Linaro I have become a co-maintainer of the Linux kernel kgdb/kdb and backlight sub-systems. I am also heavily involved in the 96Boards activities at Linaro."
Linaro
Tech lead - Support and Solutions Engineering
Daniel Thompson
DanielThompson.jpg
YVR18-417:Struck entropy! Finding true randomness from sensor data
session

Generating random numbers is essential to cryptography and providing a source of true randomness is an important feature for modern systems. The kernel provides a software implementation but this often lacks sufficient entropy at critical points (especially at boot), is not trusted by components such as OP-TEE and an equivalent rarely exists in the small RTOSes that power the IoT. An alternative is a hardware TRNG but what if you are working on a system without one?

This session is a case study describing our work to bring a hardware TRNG to Developerbox. This platform did not include a TRNG peripheral so we had to find an alternative. We wrote an OP-TEE static Trusted Application (TA) to collect entropy using thermal noise from the on-chip thermal sensors. The data we got required conditioning to eliminate bias but with simple conditioning we were able to generate sequences of numbers that pass suitable fitness tests. We will also look at how we optimized entropy collection using secure timer interrupt to avoid busy loops.

You can’t perform that action at this time.