Comparison and demonstration of entropy gathering techniques
In this video, we discuss how the Prolaag Hardware VPL generates and evaluates entropy to ensure that only high-quality random numbers are used for key generation. We also evaluate common approaches and pitfalls to whitening hardware-generated entropy.
Key takeaway: Prolaag hardware continuously tests its generated entropy before any cryptographic conditioning is applied, which is just good science. Too few of the security products today are doing this.