Random Numbers

The Intel Random Number Generator

The Intel Random Number Generator is dedicated hardware that harnesses system thermal noise to generate random values. The generator is free-running, accumulating random bits of data until a 32-bit buffer is filled.

Whitening Hardware Results

The bits the Intel RNG supplies to the application have been whitened by the hardware; that is, a post-processing algorithm has been applied to reduce patterns in the hardware bits and make them less predictable. The advantage of performing whitening in software as well as hardware is that an attacker must modify the hardware and the software to make the HRNG leak secret information.

If you are seeding a pseudo-random number generator, you can use the random number without whitening for optimal performance. If you plan to use the random numbers directly, you may wish to apply additional whitening. Since the Intel RNG performs its own whitening, performing additional whitening may reduce the performance of your application.

Using the Intel RNG

The Intel RNG enables your application to get the seed bits that are needed to produce cryptographic keys and challenges that in turn can protect vast quantities of data. In a few milliseconds, the Intel RNG can produce all the random bits needed to seed an application. This is significantly faster than the software mechanisms for gathering unpredictable bits. Software mechanisms can take as long as ten seconds to gather a seed and often require user input (for example, via the mouse or keyboard).

Unavailability of Hardware

If the Intel RNG is unavailable, then the appropriate action depends on the security needs of the application. If the Intel RNG is not working at start-up, and thus there are no seed bits available from hardware randomness, then an application with exceptionally high security needs may want to inform the user and exit. Most applications can simply notify the user and request a user-supplied seed.

1 4

R S A B S A F E C r y p t o - C I n t e l H a r d w a r e U s e r ’s G u i d e

Page 18
Image 18
RSA Security 4.3 manual Intel Random Number Generator, Whitening Hardware Results, Using the Intel RNG

4.3 specifications

RSA Security 4.3 is a robust cybersecurity solution designed to help organizations protect their sensitive data and secure digital identities. This version builds upon the foundation of its predecessors, offering enhanced features and technologies that address the evolving landscape of security threats.

One of the main features of RSA Security 4.3 is its advanced multi-factor authentication (MFA) capabilities. MFA is essential for blocking unauthorized access, and this version supports a wide range of authentication methods, including biometrics, hardware tokens, and software-based solutions. This flexibility allows organizations to implement strong security measures tailored to their specific needs while providing a seamless user experience.

Another significant characteristic of RSA Security 4.3 is its risk-based authentication. This feature evaluates the context of each login attempt, considering factors such as device reputation, geographical location, and user behavior. By analyzing these parameters, the system can dynamically adjust authentication requirements in real-time, adding an extra layer of security for high-risk logins while ensuring low-friction access for trusted users.

The solution also emphasizes centralized management, which enables IT teams to monitor and manage security policies and user access across the organization efficiently. With a user-friendly dashboard, administrators can easily identify potential security vulnerabilities and respond promptly to any threats. This centralized approach enhances the overall security posture of the organization.

RSA Security 4.3 integrates advanced analytics and machine learning, allowing organizations to detect anomalies and trends in user behavior. These capabilities help identify potential threats before they escalate, offering valuable insights into security events. This proactive approach to threat detection is crucial in a landscape where cyber attacks are becoming increasingly sophisticated.

In conclusion, RSA Security 4.3 stands out with its multi-factor authentication, risk-based authentication, centralized management, and advanced analytics. These features make it an essential tool for organizations striving to safeguard their digital assets and maintain compliance in an ever-changing cybersecurity environment. With its focus on flexibility and user experience, RSA Security 4.3 provides a comprehensive solution that helps organizations navigate the complexities of modern security challenges effectively.