On Fri, Aug 16, 2013 at 9:18 AM, Patrick Mylund Nielsen <
cryptogra...@patrickmylund.com> wrote:

> Yes, but they aren't talking about urandom. Your reply made it sound like
> random is weak, but the paper points to both (as urandom is seeded by
> random), and they propose a new AES-based PRNG that accumulates entropy
> properly.
>

I'm not sure if you feel the same way, but the  opinion of many uneducated
observers[1] seems to be that using a PRNG at all in these contexts is
"insecure" when that is absolutely not the case, and for the most part
there isn't a meaningful difference between the security of random vs
urandom except that random will run out of entropy.

The "urandom is insecure" claims are specifically what I was trying to
challenge, and I hope this paper helps drive it home. If "urandom is
insecure" it isn't more so than /dev/random

[1]:
http://arstechnica.com/security/2013/08/google-confirms-critical-android-crypto-flaw-used-in-5700-bitcoin-heist/?comments=1&post=25102733#comment-25102733

-- 
Tony Arcieri
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to