Re: depleting the random number generator -- repeated state

1999-07-31 Thread David Honig
At 03:34 PM 7/29/99 -0700, Eugene Leitl wrote: Of course one would have to believe the CPU designer that it is true noise, and not pseudorandom. One of the many uses of nitric acid. Ie, take random samples apart and look at them. There are commercial places that will do the lab work for you.

Re: depleting the random number generator -- repeated state

1999-07-31 Thread David Honig
At 04:00 PM 7/30/99 -0700, Eugene Leitl wrote: David Honig writes: One of the many uses of nitric acid. Ie, take random samples I thought this is mostly done by removing the bulk of the package polymer by grinding, and then subjecting the rest of it to a plasma etch. I believe Marcus Kuhn

Re: depleting the random number generator -- repeated state

1999-07-31 Thread Eugene Leitl
David Honig writes: One of the many uses of nitric acid. Ie, take random samples I thought this is mostly done by removing the bulk of the package polymer by grinding, and then subjecting the rest of it to a plasma etch. I haven't put a processed wafer into nitric acid yet, but I could

Re: depleting the random number generator -- repeated state

1999-07-28 Thread Arnold G. Reinhold
At 3:22 PM -0700 7/27/99, Jon Callas wrote: I built a PRNG that used an RC4 variant as John Kelsey said. The thing is also actually very Yarrow-like. I modified it later to use a state array 512 long instead of 256 long, just so it would have a larger entropy pool. When I added more entropy, I

Re: depleting the random number generator -- repeated state

1999-07-28 Thread Jon Callas
At 10:49 AM -0400 7/28/99, Arnold G. Reinhold wrote: I believe the input mechanism Anonymous described *is* the RC4 key setup mechanism. In any case, I take Anonymous' remarks about the brittle nature of RC4 very seriously. I wouldn't mess with it just to double the entropy pool. If

Re: depleting the random number generator -- repeated state

1999-07-28 Thread Arnold G. Reinhold
At 2:51 PM -0400 7/28/99, Steven M. Bellovin wrote: In message v04011701b3c4f4fbabb1@[24.218.56.100], "Arnold G. Reinhold" writes I'd spin it the other way. The best approach to making nonces -- DH exponents, symetric keys, etc -- is to use a true source of randomness. That eliminates one area

Re: depleting the random number generator -- repeated state

1999-07-27 Thread Arnold G. Reinhold
At 12:19 AM -0700 7/27/99, James A. Donald wrote: -- At 08:44 PM 7/26/99 +0200, Anonymous wrote: Even aside from active attacks, there is a possible problem based on the fact that RC4 can "almost" fall into a repeated-state situation. RC4's basic iteration looks like: (1) i += 1; (2)

Re: depleting the random number generator

1999-07-26 Thread John Kelsey
-BEGIN PGP SIGNED MESSAGE- [ To: Perry's Crypto List, James, Ben, Bram ## Date: 07/25/99 ## Subject: Re: depleting the random number generator ] Date: Sun, 25 Jul 1999 11:01:00 -0400 To: "James A. Donald" [EMAIL PROTECTED], Ben Laurie [EMAIL PROTECTED], bram [EMAIL

Re: depleting the random number generator

1999-07-26 Thread James A. Donald
-- At 01:49 PM 7/25/99 -0700, David Wagner wrote: One nice advantage of using RC4 as a nonce generator is that you can easily switch back and forth between key setup and code byte generation. You can even do both at the same time. (There is no need to reset the index variables.) This

Re: depleting the random number generator

1999-07-26 Thread bram
On Sun, 25 Jul 1999, John Kelsey wrote: Has anyone looked at this from a cryptanalytic point of view? I think there are chosen-input attacks available if you do this in the straightforward way. That is, if I get control over some of your inputs, I may be able to alternate looking at your

Re: depleting the random number generator

1999-07-26 Thread bram
On Mon, 26 Jul 1999, James A. Donald wrote: Oh dear! This suggestion worries me. Is it reasonable to expect this arrangement to be secure against e.g. chosen-entropy attacks? Yes: If the attacker knows exactly when the packets arrive (which he cannot) this cannot give him any

Re: depleting the random number generator

1999-07-26 Thread James A. Donald
-- Oh dear! This suggestion worries me. Is it reasonable to expect this arrangement to be secure against e.g. chosen-entropy attacks? On Mon, 26 Jul 1999, James A. Donald wrote Yes If the attacker knows exactly when the packets arrive (which he cannot) this cannot give him any

Re: depleting the random number generator

1999-07-26 Thread Arnold G. Reinhold
At 1:49 PM -0700 7/25/99, David Wagner wrote: In article v04011700b3c0b0807cfc@[24.218.56.100], Arnold G. Reinhold [EMAIL PROTECTED] wrote: One nice advantage of using RC4 as a nonce generator is that you can easily switch back and forth between key setup and code byte generation. You can even

Re: depleting the random number generator

1999-07-25 Thread Arnold G. Reinhold
At 8:35 AM -0700 7/21/99, James A. Donald wrote: -- At 09:24 PM 7/19/99 +0100, Ben Laurie wrote: So what you are saying is that you'd be happy to run your server forever on an inital charge of 128 bits of entropy and no more randomness ever? Yes, though I would probably prefer an initial

Re: depleting the random number generator

1999-07-21 Thread John Kelsey
-BEGIN PGP SIGNED MESSAGE- At 09:24 PM 19-07-99 +0100, Ben Laurie wrote: So what you are saying is that you'd be happy to run your server forever on an inital charge of 128 bits of entropy and no more randomness ever? Really? This model should work for all the servers in the world, of

RE: depleting the random number generator

1999-07-20 Thread Enzo Michelangeli
= Original Message From David Honig [EMAIL PROTECTED] = [...] Admittedly it may sound religious to claim that physical entropy matters, when no one can tell the difference between true random prng bits (without the prng 'key'). But a prng *is* crackable if you infer the internal state.

RE: depleting the random number generator

1999-07-19 Thread Enzo Michelangeli
Sorry folks, but I can't understand where the problem is supposed to be. The entropy of a pool is a measure of the information about its internal state that we don't know: which is why in thermodynamics the same name is given to the logarithm of the number of (invisible) microstates

Re: depleting the random number generator

1999-07-19 Thread Eric Murray
On Sun, Jul 18, 1999 at 06:09:15PM -0400, Donald E. Eastlake 3rd wrote: RFC 1750 recommends the Blum Blum Shub generator. Which is pretty slow- on the order of an RSA public key operation. A hardware RNG would be the best solution. It won't help the original poster now, but I think that

Re: depleting the random number generator

1999-07-19 Thread Ben Laurie
David Honig wrote: Ben suggests using "hashcash" to prevent malicious depletion of the entropy pool, where the "hashcash" (hashes that are expensive to compute but cheap to verify) becomes the limiting resource instead of the server's MIPS. This prevents DoS attacks but doesn't solve

Re: depleting the random number generator

1999-07-19 Thread Ben Laurie
bram wrote: On Mon, 19 Jul 1999, Enzo Michelangeli wrote: Sorry folks, but I can't understand where the problem is supposed to be. The entropy of a pool is a measure of the information about its internal state that we don't know: which is why in thermodynamics the same name is given to

Re: depleting the random number generator

1999-07-19 Thread Sandy Harris
Enzo Michelangeli wrote: Sorry folks, but I can't understand where the problem is supposed to be. The entropy of a pool is a measure of the information about its internal state that we don't know: which is why in thermodynamics the same name is given to the logarithm of the number of

Re: depleting the random number generator

1999-07-19 Thread bram
On Mon, 19 Jul 1999, Ben Laurie wrote: The brief summary of the above is that it's possible to simply replace /dev/random with something which doesn't deplete entropy and the problem will go away. And yes, it is possible to do that in a secure manner. So what you are saying is that

Re: depleting the random number generator

1999-07-19 Thread Marc Horowitz
Sandy Harris [EMAIL PROTECTED] writes: /dev/random uses SHA or MD5, so a complete break appears highly unlikely. But a special-case break, say in circumstances where the input entropy is temporarily exhausted so the attacker gets a look at N successive results where the pool does not change,

Re: depleting the random number generator

1999-07-19 Thread David Honig
Bram, the *nix /dev/random code *does* accumulate a pool of 'physical' (interrupt, interrupt timing) entropy and stirs and extracts bits via a crypto secure hash (e.g., MD5 in FreeBSD). And you can easily expand this pool by modifying the code. But the pool is always finite; therefore

RE: depleting the random number generator

1999-07-19 Thread David Honig
At 03:46 AM 7/19/99 -0400, Enzo Michelangeli wrote: Sorry folks, but I can't understand where the problem is supposed to be. The entropy of a pool is a measure of the information about its internal state that we don't know: which is why in thermodynamics the same name is given to the logarithm

Re: depleting the random number generator

1999-07-18 Thread Russell Nelson
John Denker writes: The bad part is that Whitney has already gobbled up quite a few bits of entropy from /dev/random before the slightest bit of authentication is attempted. You're presuming that you're using the standard Linux version of /dev/random. You could quite easily write a driver

Re: depleting the random number generator

1999-07-18 Thread Eugene Leitl
bram writes: Most of the fancy reseedable PRNG schemes people have come up with are based on using secure hashes. They are sure validated, but are they the best we can do? MD5, the nonplusultra, really?

Re: depleting the random number generator

1999-07-18 Thread Eugene Leitl
bram writes: I'm not sure if anybody's yarrowified /dev/random yet - I think someone from coderpunks was working on it. Does anybody know how cellular automata perform re cryptographically solid random number generators? They can crank out a lot of integers with a minimum investment in

Re: depleting the random number generator

1999-07-18 Thread bram
On Sat, 17 Jul 1999, Eugene Leitl wrote: Does anybody know how cellular automata perform re cryptographically solid random number generators? They can crank out a lot of integers with a minimum investment in instructions executed. Most of the fancy reseedable PRNG schemes people have come up

Re: depleting the random number generator

1999-07-18 Thread James A. Donald
-- At 04:45 PM 7/17/99 -0400, John Denker wrote: Step 2) The attacker endlessly iterates step 1. This is easy. AFAIK there is no useful limit on how often new applications can be made. This quickly exhausts the entropy pool on Whitney. The attacker can only "exhaust" the entropy pool

Re: depleting the random number generator

1999-07-18 Thread Bill Stewart
At 10:04 PM 7/17/99 -0700, Mike Brodhead wrote: Step 3a) If Whitney is getting key material from /dev/random, the result is a denial of service. All the IPsec tunnels will time out and will be replaced slowly or not at all, because of the entropy shortage. seems to me that the reason the

Re: depleting the random number generator

1999-07-18 Thread bram
On Sun, 18 Jul 1999, Bill Stewart wrote: /dev/urandom will give you pseudo-random bits if it's run out of entropy, so you've got the security risks inherent in that. As David Honig points out, you can't avoid those alternatives, Yes you can, if there's a 'pool' of entropy in memory which

Re: depleting the random number generator

1999-07-18 Thread Donald E. Eastlake 3rd
RFC 1750 recommends the Blum Blum Shub generator. Donald From: bram [EMAIL PROTECTED] Date: Sat, 17 Jul 1999 16:18:20 -0700 (PDT) To: Eugene Leitl [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] In-Reply-To: [EMAIL PROTECTED] Message-ID: [EMAIL PROTECTED] Content-Type: TEXT/PLAIN;

Re: depleting the random number generator

1999-07-18 Thread Ben Laurie
David Honig wrote: At 04:45 PM 7/17/99 -0400, John Denker wrote: Hi Folks -- I have a question about various scenarios for an attack against IPsec by way of the random number generator. The people on the linux-ipsec mailing list suggested I bring it up here. ..worries that

depleting the random number generator

1999-07-17 Thread John Denker
Hi Folks -- I have a question about various scenarios for an attack against IPsec by way of the random number generator. The people on the linux-ipsec mailing list suggested I bring it up here. Specifically: consider a central machine (call it Whitney) that is implementing many IPsec