Showing only posts by Cryptech Core Team. Show all posts.

Randomness Testing Tools

This page explains some basics on testing for randomness, and the background necessary to understand their outputs.

Basic Considerations

When testing the randomness of an alleged/assumed random bit/byte stream, there are two fundamentally different categories of tests: There are blackbox tests which are independent of the particular source …

Rough Cut at v0.01 Proof of Concept Feature Set

This is a proposed version 0.01 product as a proof of concept. The intent is not to have a very useful product, but rather to gain confidence in our architecture, tools, and team. The result is intended to be the basis for further development into a more useful second …

Planning for SUNET funded Cryptech Work

The following documents the first two development steps in Cryptech funded by SUNET. The development is being done by Joachim Strömbergson from Secworks AB.

Step one (Deadline 2014-02-28)

  • Acquire a FPGA development platform.

DONE. We have a Terasic DE0 board and a Terasic Cyclone V GX starter kit board.

  • Create …

Who We Are

This effort was started at the suggestion of Russ Housley, Stephen Farrell, and Jari Arkko of the IETF, to meet the assurance needs of supporting IETF protocols in an open and transparent manner.

But this is not an IETF, ISOC, ... project. As the saying goes, we work for the Internet …

Alpha Schematics

The Alpha schematics are almost finished!

PDF and Eagle files available for download here in the hardware repository.

https://wiki.cryptech.is/browser/hardware/eagle/alpha/rev02

The schematics are based on the dev-bridge board that we made in the summer of 2015, which is why it is called rev02 …

Documents, Meetings, etc.

Meetings

  • At IETF88 an open lunch meeting was held with maybe 30-40 people. Minutes will be posted here shortly.
  • An invitation-only initial exploratory and team-building meeting will be hosted by SUNET in Stockholm in December. Invitations are in process. Dress in layers. Anything useful that comes out of the meeting …

HSM Requirements

Requirements for the Cryptech Alpha System. Derived from Use Cases (see below). There are also utility, internal requirements (again, see below).

Capacity

Per key storage requirements

In addition to the actual key data, each key requires

  • Key type – 4 bytes
  • Key identifier – 4 bytes
  • Key flags, e.g. exportable – 8 …
« newer articles | page 4 | older articles »