Jitter RNG 3.7.0

SP800-90B, SP800-90C compliance

Jitter RNG Library 3.7.0 Source Code

Jitter RNG Library 3.7.0 Signature

Documentation

The following documentation is available:

Changelog

  • Add secure memory implementation for Linux and {Net,Open,Free}BSD, MacOS and Windows
  • Update supported CMake version to 3.10
  • doc: use Doxygen-style comments
  • NTG.1 compliance: Modify startup such that the memory access and SHA-3 loop are treated as independent noise sources which are sampled to collect at least 240 bits each before first block of random numbers is released
  • Remove all code when JENT_CONF_DISABLE_LOOP_SHUFFLE is unset. This code is already discouraged for a long time. Now it is taken out for good.
  • If cache size cannot be detected from base system (e.g. virtualization), use the requested memory size.
  • Change the stuck test to always calculate the absolute values of the 2nd and 3rd discrete derivation of time.
  • Replace SHA3-256 output generation with XDRBG-256
  • Prune the jitterentropy.h header file of internal definitions and delcarations which are moved to src/jitterentropy-internal.h. With that, jitterentropy.h only contains the API. This modification does not alter the Jitter RNG behavior at all.
  • Update secure storage memory implementation for libgcrypt and OpenSSL
  • Add API jent_status

3.6.3

  • Correct time stamp processing on AIX
  • Use high-resolution time stamp on Apple Silicon
  • GCD power-up test: consider OSR

Standards Compliance

  • SP800-90B compliant

  • AIS20/31 v3.0 NTG.1 compliant

Jitter RNG Daemon

The Jitter RNG daemon is a separate instance of the Jitter RNG usable on Linux to inject entropy into the Linux kernel. Applying the BSI AIS20/31 methodology, it is possible to achieve a DRT.1 seeded by an NTG.1 claim.

This code is completely independent of the aforementioned library. It consumes the library for a specific use case of the Jitter RNG.

Jitter RNG RNGd 1.3.0 Source Code

Jitter RNG RNGd 1.3.0 Signature