AIS 20/31 logo

CryptoExperts offers consulting services to evaluate the security of RNG implementations. Do you have your own RNG legacy and need to undergo a AIS20/31 or FIPS 140-2 certification process? We can help you put together the appropriate security arguments as a source for your certification documents.

Related technology

Embedded Cryptographic Libraries

Give us the instruction set of your microcontroller and we do the rest.

We have more than 16 years of experience in developing and delivering cycle-accurate optimized cryptographic libraries. Our software can be declined on a variety of hardware platforms and support standard and advanced cryptographic algorithms.

Details

Related services

Random Number Generation

Good random number generation is not a matter of chance!

Random Number Generation (RNG) is the cornerstone primitive for most security applications. The design of Random Number Generators, whether hardware-based or fully software, is at the core of our expertise.

Details

Statistical Randomness Analysis

Don't give bad randomness a chance.

Any cryptographic algorithm requires randomness at some point. And it's better be good! Even the most advanced cryptosystem will eventually fail if associated with a bad TRNG or PRNG, putting at risk the full stack of security measures you carefully crafted. Hopefully, we've got you covered.

Details

Evaluation and modeling of physical noise sources

Physical True Random Number Generators (PTRNGs) are based on a hardware noise source which is digitized and possibly composed with a post-processing mechanism. Getting an AIS20/31 certificate for a PTRNG (PTG.1/2/3 classes) requires to provide a stochastic model of the source and to demonstrate evidence on the quality of its entropy. CryptoExperts proposes a methodology that performs a statistical evaluation of the noise source, derives a relevant stochastic model, and assesses the entropy of the generated (post-processed) random numbers.

post-processing security assessment

A post-processing mechanism can be of two different natures:

  • a light-weight mixing function acting as entropy extractor for true random generation;
  • a cryptographic function for deterministic random generation or hybrid designs.

Assessing the quality of the former kind of post-processing consists in proving that it acts as a good entropy extractor. In other words, given some statistical property about the noise source, the post-processing must produce a high-entropy output. Cryptographic post-processing/DRNG on the other hand must satisfy advanced mathematical properties such as (strong) forward and/or backward secrecy. You can trust CryptoExperts to evaluate your post-processing mechanism, in the TRNG, DRNG, or hybrid setting. If the need be, we will come back to you with a set of recommendations, and finally provide you with a formal security proof of your design.

Going through AIS 20/31 certification

Our offer is not limited to evaluation, stochastic modeling, and formal security proofs, we further help our customers meet all AIS20/31 requirements (PTG.1/2/3, DRG.1/2/3/4) and support them during the overall certification process. Involve CryptoExperts and leave no room to randomness in getting your certificate!