1993-05-09 - RNG: from Zener diode?

Header Data

From: Liam David Gray <lg2g+@andrew.cmu.edu>
To: tcmay@netcom.com
Message Hash: d7d6adeed17e6a3ae17b0b72183af4ad1b2df860754a53df6a8a84b742c1cad7
Message ID: <Ufv8S0u00iUxM5LWFw@andrew.cmu.edu>
Reply To: N/A
UTC Datetime: 1993-05-09 04:24:57 UTC
Raw Date: Sat, 8 May 93 21:24:57 PDT

Raw message

From: Liam David Gray <lg2g+@andrew.cmu.edu>
Date: Sat, 8 May 93 21:24:57 PDT
To: tcmay@netcom.com
Subject: RNG: from Zener diode?
Message-ID: <Ufv8S0u00iUxM5LWFw@andrew.cmu.edu>
MIME-Version: 1.0
Content-Type: text/plain


Tim,

I recall you or some other Cypherpunk mentioning that, by some means,
strong random numbers can be had by observing some property of Zener
diodes.

Could you explain this?  ...If feasible, I imagine exploiting this
phenomenon to make a "random number dongle," an inline device for a PC's
serial or parallel port, which could be polled by savvy software.  If
possible, and if someone hasn't done it already, I'd like to work up a
simple recipe (schematic, list of ingredients, and sample code) for
this--and get it put into our "crypto-anarchists' cookbook"--i.e., on
soda.berkeley.edu.  Perhaps a future version of PGP could take advantage
of such a random noise dongle, selectable by command-line switch.

This is pure speculation at this point.  Am I completely off-base?  In
any case, I'd love to hear more about it.

Liam
---
PGP public key available by arrangement   -- The cat is out of the bag.
Too much of a dreamer not to be practical -- Go have your own "valiant defeat."
Liam David Gray <lg2g+@andrew.cmu.edu>





Thread