Industry Expert Blogs
How Random is Random? Part 2: TRNGs - Understanding Attacks at the SurfaceElliptic's Blog - David A. Jones, Senior Field Engineer, Elliptic TechnologiesApr. 30, 2015 |
How the many attacks on the random numbers generated were of great interest to me. I purchased many of the available glitching capable smart card programmers and tools. Learning how to reveal memory and modifying memory, a goal of these types of tools. Especially revealing the cryptographic secrets from the so called secure memory of the device.
However, to better understand how TRNG's are attacked it's best to understand the surface of where these attacks originate.