Randomness and Entropy Sources

Ariel OS provides RNGs which fulfill needs for both fast and cryptographically secure sources of randomness.

Provided RNGs

The random laze module needs to be enabled to be able to obtain the provided RNGs. Two different RNG interfaces are provided, which both implement rand_core traits:

  • A fast RNG interface, not suitable for cryptography use, which can be obtained with random::fast_rng().
  • A cryptographically secure pseudo-RNG (CSPRNG) interface, which can be obtained with random::crypto_rng() when the csprng Cargo feature is enabled.

To ensure fast operation of the fast RNG, the obtained RNG must be reused between invocations, instead of obtaining new ones through random::fast_rng().

RNG Seeding

When the random module is selected, the hwrng laze module is automatically enabled as well, so that the RNGs get automatically seeded from the hardware RNG (i.e., the TRNG) at startup.

In the future, Ariel OS may also support leveraging persistent storage in combination with a pre-provisioned seed to enable to use the CSPRNG on MCUs which do not provide a hardware RNG.