Jitter RNG 3.7.0
SP800-90B, SP800-90C compliance
Jitter RNG Library 3.7.0 Source Code
Jitter RNG Library 3.7.0 Signature
Documentation
The following documentation is available:
Changelog
- Add secure memory implementation for Linux and {Net,Open,Free}BSD, MacOS and Windows
- Update supported CMake version to 3.10
- doc: use Doxygen-style comments
- NTG.1 compliance: Modify startup such that the memory access and SHA-3 loop are treated as independent noise sources which are sampled to collect at least 240 bits each before first block of random numbers is released
- Remove all code when JENT_CONF_DISABLE_LOOP_SHUFFLE is unset. This code is already discouraged for a long time. Now it is taken out for good.
- If cache size cannot be detected from base system (e.g. virtualization), use the requested memory size.
- Change the stuck test to always calculate the absolute values of the 2nd and 3rd discrete derivation of time.
- Replace SHA3-256 output generation with XDRBG-256
- Prune the jitterentropy.h header file of internal definitions and delcarations which are moved to src/jitterentropy-internal.h. With that, jitterentropy.h only contains the API. This modification does not alter the Jitter RNG behavior at all.
- Update secure storage memory implementation for libgcrypt and OpenSSL
- Add API jent_status
3.6.3
- Correct time stamp processing on AIX
- Use high-resolution time stamp on Apple Silicon
- GCD power-up test: consider OSR
Standards Compliance
-
SP800-90B compliant
-
AIS20/31 v3.0 NTG.1 compliant
Jitter RNG Daemon
The Jitter RNG daemon is a separate instance of the Jitter RNG usable on Linux to inject entropy into the Linux kernel. Applying the BSI AIS20/31 methodology, it is possible to achieve a DRT.1 seeded by an NTG.1 claim.
This code is completely independent of the aforementioned library. It consumes the library for a specific use case of the Jitter RNG.