On 2008.11.05 at 00:29:40 -0800, David Schwartz wrote:

> PRNG. This is better for several reasons:
> 
> 1) You can rate-limit how much you mix in. Say you mix in 1KB at startup and
> 128 bytes every 10 seconds after that. This will provide the same quality of
> randomness for cryptographic purposes, but will limit the effort. This will
> protect you against possible denial-of-service attacks where an attacker
> tries to make you use up more randomness than you have. Many HRNGs are
> vulnerable to this.

This typically is not an issue for operations such as generation of
long-time private/public key pairs. These operations are performed with
user interaction, and usially done as separate process. This process can
well be configured to use HWRNG only.

> 2) The OpenSSL PRNG is well-investigated. If your HRNG's output is not
> comparable in quality, your security could be compromised. For example,
> subtle bias in the output could have serious cryptographic consequences.

Typically one have to perform much investigations to come out to the
market with some cryptography hardware. 
In Russia, for example this requires goverment certification, and rules
are very strict. Of course, good software which use HWRNG should test
its proper functioning each time, for example by FIPS-140 tests and just
fail if it doesn't pass.

 
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to