[149098] in cryptography@c2.net mail archive
[Cryptography] How to use FST-01?
daemon@ATHENA.MIT.EDU (Paul Elliott)
Sat Jan 18 00:45:52 2014
X-Original-To: cryptography@metzdowd.com
Date: Fri, 17 Jan 2014 14:49:23 -0600
From: Paul Elliott <pelliott@blackpatchpanel.com>
To: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
--===============7310485915869299076==
Content-Type: multipart/signed; micalg=pgp-sha1;
	protocol="application/pgp-signature"; boundary="PNTmBPCT7hxwcZjr"
Content-Disposition: inline
--PNTmBPCT7hxwcZjr
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Over the Holidays I recieved a Flying Stone Technology 01.
It is apparently a very small computer connected to
a usb port.
It apparently has 2 applications and both have relevance
to crypto.
1 Gnuk, Cryptographic USB Token
2 NeuG, a True Random Number Generator Implementation
All of the published software is GPLed.
I have a number of questions:
How do I set up the FST-01 to be a hardware RNG?
How do I use?
Will it work with my Raspberry PI?
If my Raspberry PI has a 1 amp power supply, can I plug the
FST-directly into it or do I need to use a powered usb hub?
Rapberry PI are notoriously finicky about their power, a small
voltage drop causes the PI to fail. There are many usb devices
that can not be directly plugged into a PI. Is the FST-01 one
of these?
What is the reason for GnuK? What is the use case?
What is a Cryptographic USB Token?
Can I setup my FST-01 to be either a GNUK or a NEUG depending
on the desire of the moment?
Thank You for considering these questions.
--=20
Paul Elliott                               1(512)837-1096
pelliott@BlackPatchPanel.com               PMB 181, 11900 Metric Blvd Suite=
 J
http://www.free.blackpatchpanel.com/pme/   Austin TX 78758-3117
---
"Encryption works. Properly implemented strong crypto systems are one
of the few things that you can rely on. Unfortunately, endpoint
security is so terrifically weak that NSA can frequently find ways
around it." Edward Snowden
--PNTmBPCT7hxwcZjr
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (GNU/Linux)
iEYEARECAAYFAlLZl1MACgkQiv9zpDRc3ZkC5QCgpGzOdXSLdb8aqNzhYPcpBxL2
4fsAn0y+aQnivwkjXeyW2poEk+9d8uA4
=VpJc
-----END PGP SIGNATURE-----
--PNTmBPCT7hxwcZjr--
--===============7310485915869299076==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============7310485915869299076==--