James A. Donald wrote:
James A. Donald wrote:
 > > I see no valid case for on chip whitening. Whitening
 > > looks like a classic job for software. Why waste chip
 > > real estate on something that will only be used 0.001% of
 > > the time.

On 2012-06-22 6:53 AM, Michael Nelson wrote:
 > I suppose that if the rng was shared between multiple
 > processes, and if a malicious process could read the
 > internal state, then it could predict what another process
 > was going to be given in the near future.

To the extent that rng generates true randomness, it can only partially predict. Assuming that each process collects sufficient true randomness for its purposes, not a problem. That is the whole point and purpose of generating true randomness.


Just a few more random arguments in this discussion.

The NIST SP800-90 architecture, which is used in the Intel RNG, has

(A) a true random sampling process which "provides less than full" entropy, followed by

(B) an adaptation process, deterministic but not a NIST algorithm, called "conditioning" which provides well quantified full entropy bits (the designer has to make the demonstration that the goal is reached given the available understanding of the random sampling process), and finally

(C) the DRBG (deterministic random bit generator) which is periodically seeded by the output of the conditioning algorithm.

(A) is truly random, (B) and (C) are deterministic.

If your enemy has access to the data used by either the conditioning algorithm or the DRBG, he can figure out their respective output.

Because the Intel RNG designers do not know which CPU request comes from a user versus an enemy, so they only provide a unique and independent output portion to each of them. One can not guess what the other received. If the enemy can trace the user program with debugging support CPU facilities, he might be in a position to eavesdrop an output portion given to the user. Be careful.

But don't trust me about these explanations, I might be an enemy. At least Intel designers don't trust me to audit their deterministic algorithms implementations within production parts. So they protect your secure applications, just in case my Trojan horse software is loaded when your application runs.

As a concluding remark, ... well why should I share a conclusion with potential enemies? You may as well (truly random) draw your own conclusion.

Regards,



--
- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, QC, Canada H2M 2A1

Tel. +1-514-385-5691
_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to