RdRand
RdRand
(also RDRAND
; previously known as Bull Mountain[2]) is an instruction for returning random numbers from an Intel on-chip hardware random number generator.[3] RdRand
is available in Ivy Bridge processors[note 1] and is part of the Intel 64 and IA-32 instruction set architectures. The random number generator is compliant with security and cryptographic standards such as NIST SP 800-90A,[4] FIPS 140-2, and ANSI X9.82.[3]
Details
The CPUID
instruction can be used to check whether the central processing unit (CPU) supports the RDRAND
instruction. If supported, bit 30 of the ECX register is set after calling CPUID standard function 01H
.[5]
The opcode for RDRAND
is 0x0F 0xC7
, followed by a ModRM byte that specifies the destination register and optionally combined with a REX prefix in 64 bit mode.[6]
Intel Secure Key is Intel's code name for both the RdRand
instruction and the underlying random number generator (RNG) hardware implementation.[3] Intel calls their RNG a "digital random number generator". The generator uses an on-processor entropy source, which passes the randomly generated bits to an Advanced Encryption Standard (AES) (in CBC-MAC mode) conditioner to distill the entropy into non-deterministic random numbers. A deterministic random-bit generator is seeded by the output from the conditioner, providing cryptographically secure random numbers to applications requesting them via the RdRand
instruction.[3][7]
Intel states that RdRand employs the NIST SP800-90 standard, which specifies four random number generators: CTR DRBG (used by RdRand
), Hash DRBG, HMAC DRBG,[4] and Dual_EC_DRBG. The latter is known to be kleptographic.[8] However, Intel states that RdRand
only uses CTR_DRBG.[citation needed]
Reception
Theodore Ts'o publicly stated about the use of RdRand
for /dev/random in the Linux kernel, "I am so glad I resisted pressure from Intel engineers to let /dev/random rely only on the RDRAND instruction. To quote from the article below: 'By this year, the Sigint Enabling Project had found ways inside some of the encryption chips that scramble information for businesses and governments, either by working with chipmakers to insert back doors....' Relying solely on the hardware random number generator which is using an implementation sealed inside a chip which is impossible to audit is a BAD idea."[9]
Linus Torvalds dismissed concerns about the use of RdRand
in the Linux kernel, and pointed out that it is not the only source of entropy for /dev/random.[10]
Developers changed the FreeBSD kernel away from using RdRand
and VIA PadLock directly with the comment "For [FreeBSD] 10, we are going to backtrack and remove RDRAND and Padlock backends and feed them into Yarrow instead of delivering their output directly to /dev/random. It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more"[10][11]
RDSEED
The RDSEED
instruction was latterly added to Intel Secure Key for seeding another pseudorandom number generator,[12] with Broadwell CPUs.
See also
Notes
References
- ↑ Desktop 3rd Generation Intel® Core™ Processor Family, Specification Update. Intel Corporation. January 2013.
- ↑ Hofemeier, Gael (2011-06-22). "Find out about Intel's new RdRand Instruction.". Intel Developer Zone Blogs. Retrieved December 2013.
- ↑ 3.0 3.1 3.2 3.3 "Intel Digital Random Number Generator (DRNG): Software Implementation Guide, Revision 1.1" (PDF). Intel Corporation. 2012-08-07. Retrieved 2012-11-25.
- ↑ 4.0 4.1 Barker, Elaine; Kelsey, John (January 2012). "Recommendation for Random Number Generation Using Deterministic Random Bit Generators" (PDF). National Institute of Standards and Technology. Retrieved September 16, 2013.
- ↑ "Volume 1, Section 7.3.17, 'Random Number Generator Instruction'". Intel® 64 and IA-32 Architectures Software Developer’s Manual Combined Volumes: 1, 2A, 2B, 2C, 3A, 3B and 3C. Intel Corporation. June 2013. p. 177. Retrieved 24 June 2013. "All Intel processors that support the RDRAND instruction indicate the availability of the RDRAND instruction via reporting CPUID.01H:ECX.RDRAND[bit 30] = 1"
- ↑ "Intel® Digital Random Number Generator (DRNG) Software Implementation Guide | Intel® Developer Zone". Software.intel.com. Retrieved 2014-01-30.
- ↑ Taylor, Greg; Cox, George (September 2011). "Behind Intel's New Random-Number Generator". IEEE Spectrum.
- ↑ Bruce Schneier (November 15, 2007). "Did NSA Put a Secret Backdoor in New Encryption Standard?". Wired.
- ↑ September 6, 2013 Google Plus posting by Theodore Ts'o
- ↑ 10.0 10.1 Richard Chirgwin (2013-12-09). "FreeBSD abandoning hardware randomness". The Register.
- ↑ "FreeBSD Quarterly Status Report". Freebsd.org. Retrieved 2014-01-30.
- ↑ John Mechalas (November 2012). "The Difference Between RDRAND and RDSEED". software.intel.com. Intel Corporation. Retrieved 1 January 2014.