On Tue, Jun 19, 2012 at 1:54 PM, Marsh Ray <[email protected]> wrote:
> ... Just a sanity check that the output is
> actually changing once in a while would go a long way towards
> eliminating the most common failure modes.

On Tue, Jun 19, 2012 at 6:58 PM,  <[email protected]> wrote:
> ... Actually having a perfect source is a problem. It's much easier to
> test for a source with known defects that meet a well defined statistical
> model.

is there any literature on the typical failure modes of TRNG/entropy
sources in deployed systems?

my understanding is that they tend to fail catastrophically, in a way
easily detected by FIPS sanity checks. E.g. clearly broken.

is it exceedingly rare for subtle / increasing bias to occur due to
hardware failure or misuse in most designs? are there designs which
fail hard rather than fail silent when error is encountered?
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to