Comparison of hardware random number generators
- Comparison of hardware random number generators
-
In computing, a hardware random number generator is an apparatus that generates random numbers from a physical process. Such devices are often based on microscopic phenomena that generate a low-level, statistically random "noise" signal, such as thermal noise or the photoelectric effect or other quantum phenomena.
Manufacturer |
Model |
Intro Date |
Interface |
OS |
Price |
Throughput |
Simtec Electronics |
Entropy Key |
2009 |
USB |
Windows[1]/Linux/BSD |
US$60 (£36) |
32 kbit/s[2] |
ID Quantique SA |
Quantis-USB |
2006 |
USB |
Windows/Linux |
US$1310 (€990) |
4 Mbit/s[3] |
ID Quantique SA |
Quantis-PCI-4 |
2006 |
PCI |
Windows/Linux |
US$2952 (€2230) |
16 Mbit/s[3] |
Protego |
SG100 |
1997 |
SERIAL |
Windows/Linux/Solaris |
US$325 (€243) |
128 Kbit/s[4] |
Protego |
SG100-EVO |
2009 |
USB |
Windows/Linux/Solaris |
US$373 (€279) |
128 Kbit/s[5] |
Comscire |
R2000KU |
2006 |
USB |
Windows |
US$895 |
2 Mbit/s[6] |
LETech (Dead Link, no company there) |
GRANG-PCI |
2008 |
PCI |
Linux/Windows |
US$5,500 |
400 Mbit/s[7] |
TRNG98 |
TRNG9803 (Dead Link, no company there) |
2009 |
Serial |
Linux/Windows |
US$208 |
56 kbit/s[8] |
References
Wikimedia Foundation.
2010.
Look at other dictionaries:
Hardware random number generator — This SSL Accelerator computer card uses a hardware random number generator to generate cryptographic keys to encrypt data sent over computer networks. In computing, a hardware random number generator is an apparatus that generates random numbers… … Wikipedia
Radioactive decay — For particle decay in a more general context, see Particle decay. For more information on hazards of various kinds of radiation from decay, see Ionizing radiation. Radioactive redirects here. For other uses, see Radioactive (disambiguation).… … Wikipedia
Free will — This article is about the philosophical questions of free will. For other uses, see Free will (disambiguation). A domino s movement is determined completely by laws of physics. Incompatibilists say that this is a threat to free will, but… … Wikipedia
Decorrelation — is a general term for any process that is used to reduce autocorrelation within a signal, or cross correlation within a set of signals, while preserving other aspects of the signal. A frequently used method of decorrelation is the use of a… … Wikipedia
Quantum cryptography — Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt… … Wikipedia
MOS Technology SID — MOS Technology SIDs. The right chip is a 6581 from MOS Technology, known at the time as the Commodore Semiconductor Group (CSG.) The left chip is an 8580, also from MOS Technology. The numbers 0488 and 3290 are in WWYY form, i.e. the chips were… … Wikipedia
Brute-force attack — The EFF s US$250,000 DES cracking machine contained over 1,800 custom chips and could brute force a DES key in a matter of days. The photograph shows a DES Cracker circuit board fitted with 32 Deep Crack chips and some control chips. In… … Wikipedia
One-time password — A one time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. The most important shortcoming that is addressed by OTPs … Wikipedia
Java Platform, Standard Edition — or Java SE is a widely used platform for programming in the Java language. It is the Java Platform used to deploy portable applications for general use.In practical terms, Java SE consists of a virtual machine, which must be used to run Java… … Wikipedia
Cryptographic hash function — A cryptographic hash function (specifically, SHA 1) at work. Note that even small changes in the source input (here in the word over ) drastically change the resulting output, by the so called avalanche effect. A cryptographic hash function is a… … Wikipedia