Intel Secure Key, was previously code-named Bull Mountain Technology. It is the Intel name for the Intel 64 and IA-32 Architectures instruction RDRAND and its underlying Digital Random Number Generator (DRNG) hardware implementation. Among other things, the DRNG using the RDRAND instruction is useful for generating high-quality keys for cryptographic protocols.
Because this technology recently launched (May 2012) with the Intel 3rd Generation Core processors (code-named Ivy Bridge) the Bull Mountain Software Implementation Guide has been renamed to the Intel Digital Random Number Generator Software Implementation Guide.
About the Intel DRNG Software Implementation Guide:
This technology is documented and described in the Intel Digital Random Number Generator Software Implementation Guide. It is intended to provide a complete source of technical information on the RDRAND Instruction usage, including code examples. Here is a recap of what this guide covers:
- Random Number Generator (RNG) Basics and Introduction to the DRNG. This guide describes the nature of an RNG and its pseudo- (PRNG) and true- (TRNG) implementation variants, including modern cascade construction RNGs. We then present the DRNG's position within this broader taxonomy.
- A technical overview of the DRNG, including its component architecture, robustness features, manner of access, performance, and power requirements.
- RDRAND Instruction usage, providing reference information on the RDRAND instruction and code examples showing its use. This includes RDRAND platform support verification and suggestions on DRNG-based libraries.
This Software Implementation Guide is designed to serve a variety of readers. Software Developers who already understand the nature of RNGs may skip the first 3 sections and simply refer to the RDRAND instruction reference and code examples.
Here is the link for the Intel Digital Random Number Generator (DRNG) Software Implementation Guide.
Questions? Please visit our forum and start a discussion.