Randomness and Entropy Sources
Ariel OS provides RNGs which fulfill needs for both fast and cryptographically secure sources of randomness.
Provided RNGs
The random
laze module needs to be enabled to be able to obtain the provided RNGs.
Two different RNG interfaces are provided, which both implement rand_core
traits:
- A fast RNG interface, not suitable for cryptography use, which can be obtained with
random::fast_rng()
. - A cryptographically secure pseudo-RNG (CSPRNG) interface, which can be obtained with
random::crypto_rng()
when thecsprng
Cargo feature is enabled.
To ensure fast operation of the fast RNG, the obtained RNG must be reused between invocations, instead of obtaining new ones through
random::fast_rng()
.
RNG Seeding
When the random
module is selected, the hwrng
laze module is automatically enabled as well, so that the RNGs get automatically seeded from the hardware RNG (i.e., the TRNG) at startup.
In the future, Ariel OS may also support leveraging persistent storage in combination with a pre-provisioned seed to enable to use the CSPRNG on MCUs which do not provide a hardware RNG.