What is OneRNG?
OneRNG is a small hardware unit that generates/collects informational entropy (random numbers), primarily from an avalanche diode circuit, but also from an RF circuit if you choose to enable it, and presents the results over a USB/Serial connection to your computer.
This allows you to improve the quality and availability of random data needed by your computer for cryptography, security, research & operational purposes.
OneRNG is designed to be verifiable, hackable and affordable.
When you receive an OneRNG from us, you should carefully verify that the unit you have is what you wanted.
OneRNG is designed so that the hardware can be visually inspected, so that you can verify the layout and components match the design without using specialist equipment (a magnifying glass is about all you'll need!)
Next, you should be able to verify that the firmware running the device is what we supplied. Our firmware is signed, and other techniques are used to make sure you can detect any possible changes.
Additionally, you can control which noise sources are used as well as the use of the data whitening feature. This flexibility enables you to periodically test the functionality of the sources, to confirm the correct operation of the device.
You should be able to completely control all the technology that you rely on. To this end, the entire software, firmware and hardware design of OneRNG is published and licenced Open Hardware and Free Software/Open Source.
If you have the (optional) device programmer, you can replace our firmware with one of your own.
You can use our designs to build your own copy of the unit, or incorporate some of our solutions into your own designs.
The original inspiration for OneRNG was the Entropy Key, see http://www.entropykey.co.uk/ for details. Sadly, we believe that there are no future plans to make any more of these devices.
Another solution that was available early on is NeuG, see https://www.gniibe.org/memo/development/gnuk/rng/neug.html for details of this device, which is available from the Free Software Foundation shop.
We learned a lot from the paper discussing Turbid, by John S. Denker, which uses your computer's existing audio I/O system as a source.
We missed the LCA 2014 talk from Paul Warren discussing his approach to using SDR (software defined radio) as a source, https://github.com/pwarren/rtl-entropy, but caught up with him soon afterwards.
Altus Metrum (Bdale Garbee & Keith Packard) produced their own device, ChaosKey, taking correct advantage of our Open Source designs to help them build theirs.