On Tue, Jun 19, 2012 at 1:54 PM, Marsh Ray <[email protected]> wrote: > ... Just a sanity check that the output is > actually changing once in a while would go a long way towards > eliminating the most common failure modes.
On Tue, Jun 19, 2012 at 6:58 PM, <[email protected]> wrote: > ... Actually having a perfect source is a problem. It's much easier to > test for a source with known defects that meet a well defined statistical > model. is there any literature on the typical failure modes of TRNG/entropy sources in deployed systems? my understanding is that they tend to fail catastrophically, in a way easily detected by FIPS sanity checks. E.g. clearly broken. is it exceedingly rare for subtle / increasing bias to occur due to hardware failure or misuse in most designs? are there designs which fail hard rather than fail silent when error is encountered? _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
