Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Understanding and Managing Entropy Usage

Black Hat via YouTube

Overview

Explore the critical role of entropy in modern cryptography and IT systems in this 56-minute Black Hat conference talk. Delve into the importance of cryptographically strong random numbers for key generation and nonce inclusion. Examine the challenges of Pseudo Random Number Generators (PRNGs) and their reliance on entropy sources. Discover the impact of Perfect Forward Secrecy on entropy usage in TLS. Analyze entropy requirements and utilization across various systems, including Linux, FreeBSD, OpenSSL, OpenSSH, and OpenVPN. Learn about entropy consumption in different TLS modes and the quality of entropy sources in common hardware. Gain insights into the newly released open-source software, libentropy, which provides a unified interface for OpenSSL to manage entropy sources and report usage statistics. Explore topics such as NIST guidelines, entropy pools, entropy estimation, and quantum random number generators.

Syllabus

Introduction
Penn College of Technology
Research
The Game
Entropy vs Randomness
Random Number Generators
NIST Guidelines
Linux
Ivy Bridge
Lava Lamp
PRNG
Monitor Entropy
Entropy Pools
Entropy Statistics
Summary
Rand
OpenSSL
FreeBSD
ModSSL
Nginx
Entropy Estimation
Controlling Inputs
Entropy Client
Open SSL
The Holy War
Quantum RNG
Open Source
Headless Machine
Bruce Question
Bitcoin Hack
Test Suites

Taught by

Black Hat

Reviews

Start your review of Understanding and Managing Entropy Usage

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.