{"id":121,"date":"2008-02-10T11:21:10","date_gmt":"2008-02-10T19:21:10","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/02\/10\/toshibas-new-random-number-generator\/"},"modified":"2008-02-10T11:21:10","modified_gmt":"2008-02-10T19:21:10","slug":"toshibas-new-random-number-generator","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/10\/toshibas-new-random-number-generator\/","title":{"rendered":"Toshiba&#8217;s New Random Number Generator"},"content":{"rendered":"<p>Toshiba has recently unveiled a new IC which is capable of generating 2 megabits\/second of random bits. The IC utilizes analog noise generated by electrons trapped on a silicon nitride (SiN) layer of a transistor. The electrons randomly are bound and released from this SiN layer at a very high rate enabling the generation of 2Mb\/s of random bits. This analog value is then fed to an analog-digital converter and the resulting output is the random number. Since this IC is so small it can be easily incorporated into even portable devices enhancing the strength of encryption available in portable devices.<\/p>\n<p>Original article <a href=\"http:\/\/www.digit-life.com\/news.html?10\/01\/81\">here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Toshiba has recently unveiled a new IC which is capable of generating 2 megabits\/second of random bits. The IC utilizes analog noise generated by electrons trapped on a silicon nitride (SiN) layer of a transistor. The electrons randomly are bound &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/02\/10\/toshibas-new-random-number-generator\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":50,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-121","post","type-post","status-publish","format-standard","hentry","category-current-events"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=121"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/121\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}