-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrating SHA-512 HMAC DRBG and Exploring for crypto-secure Superior Random Number Generation #557
Conversation
Regarding the performance, it's inferior in comparison to AES. Also SHA New Instructions were introduced recently, starting with 1st. Ryzen gen. |
@Knogle If you are thinking of adding any more prngs can you update your master first, before creating the branch otherwise it causes me a load of work resolving conflicts. Thanks 👍 |
Yeah you are right, it's a lot of work heh. |
The xoro wipes are still running but looks like there won't be any issues. I'm busy tomorrow morning but I'll start the tests on sha-hmac tomorrow afternoon (Friday) so will merge tomorrow evening if no problems. |
Unfortunately, in it's current state this would be unusable for nwipe. It's incredibly slow, using any of the other prngs it would take approximately six hours to wipe the 16 drives shown below but with the sha-512 DBRG it would take over 282 hours! About 50 times longer than the other prngs. A typical drives I/O speed has dropped from 100MB/sec to 0.23MB/sec. The cores in use on this 40 core processor are maxed out with nwipe's CPU % being at 1600% Is it possible to implement our own sha-512 DBRG without using openssl? Maybe that would be faster or is it a bug in the implementation? |
Hey! Oh that's bad. May i ask which CPU architecture your system is using? Do you know how to modify the Tried this without effect.
EDIT: We are not using any hardware acceleration yet which explains those bad results.
|
40 core Xeon
Sorry, no. |
SHA-256 is twice as slow as SHA-512, now over 500hrs to completion. nwipe_SHA-256_16_drive_test-2024-03-22_18.58.23.mp4 |
Ahhh okay. Unfortunately it doesn't have Intel SHA. |
Hey, i hope you are doing fine. |
This pull request heralds the implementation of the SHA-512 HMAC Deterministic Random Bit Generator (DRBG) for cryptographically secure random number generation within our project. By leveraging the robustness and security of the SHA-512 HMAC algorithm, we significantly elevate our capability to produce secure, unpredictable random numbers, crucial for a wide array of cryptographic functions and secure data processes.
Key Benefits of SHA-512 HMAC DRBG:
1. Superior Security:
The SHA-512 HMAC DRBG offers unparalleled security by integrating the cryptographic strength of SHA-512 with HMAC, ensuring resistance against both brute force attacks and sophisticated cryptographic attacks. This enhancement is essential for applications requiring the highest degree of randomness and security, such as cryptographic key generation, secure communications, and high-security token generation.
2. Compliance with Cryptographic Standards:
Adhering to established cryptographic standards, SHA-512 HMAC DRBG meets or exceeds the requirements set forth by organizations such as NIST (National Institute of Standards and Technology), providing a vetted and reliable foundation for generating cryptographically secure random numbers.
3. Robustness Against Predictability:
By utilizing a HMAC-based construction, SHA-512 HMAC DRBG significantly mitigates the risk of predictability and randomness attacks, ensuring that the generated numbers are secure for all cryptographic purposes.
4. High Performance and Efficiency:
Despite its cryptographic robustness, SHA-512 HMAC DRBG maintains high performance and efficiency, making it well-suited for environments where both security and speed are paramount. This balance ensures that applications can generate secure random numbers without significant impact on performance.
Integration Details:
The integration of SHA-512 HMAC DRBG into our project has been carefully planned to ensure both ease of use and high compatibility with existing systems. The pull request encompasses the core SHA-512 HMAC DRBG algorithm implementation, detailed documentation for developers, and utility functions for efficient key management and random number generation. This comprehensive approach guarantees that developers have immediate access to secure random number generation capabilities, enhancing the overall security and integrity of the project.
The adoption of SHA-512 HMAC DRBG marks a strategic enhancement to our project's cryptographic infrastructure, emphasizing our commitment to security, reliability, and adherence to the highest standards of cryptographic excellence.'s cryptographic infrastructure, emphasizing our commitment to security, reliability, and adherence to the highest standards of cryptographic excellence.
Testing: