At 03:34 PM 7/29/99 -0700, Eugene Leitl wrote:
Of course one would have to believe the CPU designer that it is true
noise, and not pseudorandom.
One of the many uses of nitric acid. Ie, take random samples
apart and look at them. There are commercial places that
will do the lab work for you.
At 04:00 PM 7/30/99 -0700, Eugene Leitl wrote:
David Honig writes:
One of the many uses of nitric acid. Ie, take random samples
I thought this is mostly done by removing the bulk of the package
polymer by grinding, and then subjecting the rest of it to a plasma
etch.
I believe Marcus Kuhn
David Honig writes:
One of the many uses of nitric acid. Ie, take random samples
I thought this is mostly done by removing the bulk of the package
polymer by grinding, and then subjecting the rest of it to a plasma
etch.
I haven't put a processed wafer into nitric acid yet, but I could
At 3:22 PM -0700 7/27/99, Jon Callas wrote:
I built a PRNG that used an RC4 variant as John Kelsey said. The thing is
also actually very Yarrow-like. I modified it later to use a state array
512 long instead of 256 long, just so it would have a larger entropy pool.
When I added more entropy, I
At 10:49 AM -0400 7/28/99, Arnold G. Reinhold wrote:
I believe the input mechanism Anonymous described *is* the RC4 key setup
mechanism. In any case, I take Anonymous' remarks about the brittle nature
of RC4 very seriously. I wouldn't mess with it just to double the entropy
pool. If
At 2:51 PM -0400 7/28/99, Steven M. Bellovin wrote:
In message v04011701b3c4f4fbabb1@[24.218.56.100], "Arnold G. Reinhold"
writes
I'd spin it the other way. The best approach to making nonces -- DH
exponents, symetric keys, etc -- is to use a true source of randomness.
That eliminates one area
At 12:19 AM -0700 7/27/99, James A. Donald wrote:
--
At 08:44 PM 7/26/99 +0200, Anonymous wrote:
Even aside from active attacks, there is a possible problem based on
the fact that RC4 can "almost" fall into a repeated-state situation.
RC4's basic iteration looks like:
(1) i += 1;
(2)
-BEGIN PGP SIGNED MESSAGE-
[ To: Perry's Crypto List, James, Ben, Bram ##
Date: 07/25/99 ##
Subject: Re: depleting the random number generator ]
Date: Sun, 25 Jul 1999 11:01:00 -0400
To: "James A. Donald" [EMAIL PROTECTED], Ben Laurie
[EMAIL PROTECTED], bram [EMAIL
--
At 01:49 PM 7/25/99 -0700, David Wagner wrote:
One nice advantage of using RC4 as a nonce generator is that you can
easily
switch back and forth between key setup and code byte generation. You can
even do both at the same time. (There is no need to reset the index
variables.) This
On Sun, 25 Jul 1999, John Kelsey wrote:
Has anyone looked at this from a cryptanalytic point of
view? I think there are chosen-input attacks available if
you do this in the straightforward way. That is, if I get
control over some of your inputs, I may be able to alternate
looking at your
On Mon, 26 Jul 1999, James A. Donald wrote:
Oh dear! This suggestion worries me.
Is it reasonable to expect this arrangement to be secure
against e.g. chosen-entropy attacks?
Yes: If the attacker knows exactly when the packets arrive (which he
cannot) this cannot give him any
--
Oh dear! This suggestion worries me.
Is it reasonable to expect this arrangement to be secure
against e.g. chosen-entropy attacks?
On Mon, 26 Jul 1999, James A. Donald wrote
Yes If the attacker knows exactly when the packets arrive (which he
cannot) this cannot give him any
At 1:49 PM -0700 7/25/99, David Wagner wrote:
In article v04011700b3c0b0807cfc@[24.218.56.100],
Arnold G. Reinhold [EMAIL PROTECTED] wrote:
One nice advantage of using RC4 as a nonce generator is that you can easily
switch back and forth between key setup and code byte generation. You can
even
At 8:35 AM -0700 7/21/99, James A. Donald wrote:
--
At 09:24 PM 7/19/99 +0100, Ben Laurie wrote:
So what you are saying is that you'd be happy to run your server
forever on an inital charge of 128 bits of entropy and no more
randomness ever?
Yes, though I would probably prefer an initial
-BEGIN PGP SIGNED MESSAGE-
At 09:24 PM 19-07-99 +0100, Ben Laurie wrote:
So what you are saying is that you'd be happy to run your
server forever on an inital charge of 128 bits of entropy
and no more randomness ever?
Really?
This model should work for all the servers in the world, of
= Original Message From David Honig [EMAIL PROTECTED] =
[...]
Admittedly it may sound religious to claim that physical entropy
matters, when no one can tell the difference between true random prng
bits (without the prng 'key'). But a prng *is* crackable
if you infer the internal state.
Sorry folks, but I can't understand where the problem is supposed to be. The
entropy of a pool is a measure of the information about its internal state
that we don't know: which is why in thermodynamics the same name is given to
the logarithm of the number of (invisible) microstates
On Sun, Jul 18, 1999 at 06:09:15PM -0400, Donald E. Eastlake 3rd wrote:
RFC 1750 recommends the Blum Blum Shub generator.
Which is pretty slow- on the order of an RSA public key operation.
A hardware RNG would be the best solution. It won't help the
original poster now, but I think that
David Honig wrote:
Ben suggests using "hashcash" to prevent malicious depletion of the entropy
pool,
where the "hashcash" (hashes that are expensive to compute but cheap to
verify)
becomes the limiting resource instead of the server's MIPS.
This prevents DoS attacks but doesn't solve
bram wrote:
On Mon, 19 Jul 1999, Enzo Michelangeli wrote:
Sorry folks, but I can't understand where the problem is supposed to be. The
entropy of a pool is a measure of the information about its internal state
that we don't know: which is why in thermodynamics the same name is given to
Enzo Michelangeli wrote:
Sorry folks, but I can't understand where the problem is supposed to be. The
entropy of a pool is a measure of the information about its internal state
that we don't know: which is why in thermodynamics the same name is given to
the logarithm of the number of
On Mon, 19 Jul 1999, Ben Laurie wrote:
The brief summary of the above is that it's possible to simply replace
/dev/random with something which doesn't deplete entropy and the problem
will go away. And yes, it is possible to do that in a secure manner.
So what you are saying is that
Sandy Harris [EMAIL PROTECTED] writes:
/dev/random uses SHA or MD5, so a complete break appears highly unlikely.
But a special-case break, say in circumstances where the input entropy is
temporarily exhausted so the attacker gets a look at N successive results
where the pool does not change,
Bram, the *nix /dev/random code *does* accumulate a pool of 'physical'
(interrupt, interrupt timing) entropy and stirs and extracts bits
via a crypto
secure hash (e.g., MD5 in FreeBSD). And you can easily expand this
pool by modifying the code. But the pool is always finite; therefore
At 03:46 AM 7/19/99 -0400, Enzo Michelangeli wrote:
Sorry folks, but I can't understand where the problem is supposed to be. The
entropy of a pool is a measure of the information about its internal state
that we don't know: which is why in thermodynamics the same name is given to
the logarithm
John Denker writes:
The bad part is that Whitney has already gobbled up quite a few
bits of entropy from /dev/random before the slightest bit of
authentication is attempted.
You're presuming that you're using the standard Linux version of
/dev/random. You could quite easily write a driver
bram writes:
Most of the fancy reseedable PRNG schemes people have come up with are
based on using secure hashes.
They are sure validated, but are they the best we can do? MD5, the
nonplusultra, really?
bram writes:
I'm not sure if anybody's yarrowified /dev/random yet - I think someone
from coderpunks was working on it.
Does anybody know how cellular automata perform re cryptographically
solid random number generators? They can crank out a lot of integers
with a minimum investment in
On Sat, 17 Jul 1999, Eugene Leitl wrote:
Does anybody know how cellular automata perform re cryptographically
solid random number generators? They can crank out a lot of integers
with a minimum investment in instructions executed.
Most of the fancy reseedable PRNG schemes people have come up
--
At 04:45 PM 7/17/99 -0400, John Denker wrote:
Step 2) The attacker endlessly iterates step 1. This is easy.
AFAIK there is no useful limit on how often new applications can be
made. This quickly exhausts the entropy pool on Whitney.
The attacker can only "exhaust" the entropy pool
At 10:04 PM 7/17/99 -0700, Mike Brodhead wrote:
Step 3a) If Whitney is getting key material from /dev/random, the result
is
a denial of service. All the IPsec tunnels will time out and will be
replaced slowly or not at all, because of the entropy shortage.
seems to me that the reason the
On Sun, 18 Jul 1999, Bill Stewart wrote:
/dev/urandom will give you pseudo-random bits if it's run out of entropy,
so you've got the security risks inherent in that.
As David Honig points out, you can't avoid those alternatives,
Yes you can, if there's a 'pool' of entropy in memory which
RFC 1750 recommends the Blum Blum Shub generator.
Donald
From: bram [EMAIL PROTECTED]
Date: Sat, 17 Jul 1999 16:18:20 -0700 (PDT)
To: Eugene Leitl [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
In-Reply-To: [EMAIL PROTECTED]
Message-ID: [EMAIL PROTECTED]
Content-Type: TEXT/PLAIN;
David Honig wrote:
At 04:45 PM 7/17/99 -0400, John Denker wrote:
Hi Folks --
I have a question about various scenarios for an attack against IPsec by way
of the random number generator. The people on the linux-ipsec mailing list
suggested I bring it up here.
..worries that
Hi Folks --
I have a question about various scenarios for an attack against IPsec by way
of the random number generator. The people on the linux-ipsec mailing list
suggested I bring it up here.
Specifically: consider a central machine (call it Whitney) that is
implementing many IPsec
35 matches
Mail list logo