All, ICS/SCADA, Honeypot, Malware, Intrusion detection, Forensics, IoT, Cars, Mobile, Anomaly detection, Privacy, Anonymization, Risk management, Machine Learning, Fairness, Economics, Targeted attacks, Network monitoring, SIEM, PKI, Software Security, Cryptography, Random Number Generation, Security Education
We are looking for possible solutions to generate a fair amount of cryptographically secure entropy data to support internal and external key generation and other cryptographic operations. The goal is to have an independent solution that could scale from a single test system to a multi datacenter solution. The task of the student includes: collect and summarize the possible solutions and corresponding documentations (research, blog, patents and so on); design a scalable solution viable for enterprise implementation; discuss the libraries and the technologies that the project would like to use; if possible implement the full hardware and software components; run and pass multiple types of statistical tests.
Maximum number of students: 1 student