Design & Reuse

Industry Expert Blogs

How Random is Random? Part 2: TRNGs - Understanding Attacks at the Surface

-
April 30, 2015

How the many attacks on the random numbers generated were of great interest to me. I purchased many of the available glitching capable smart card programmers and tools. Learning how to reveal memory and modifying memory, a goal of these types of tools. Especially revealing the cryptographic secrets from the so called secure memory of the device.

However, to better understand how TRNG's are attacked it's best to understand the surface of where these attacks originate.

Click here to read more ...