Am Freitag, 29. November 2013, 11:55:41 schrieb Stephan Mueller: Hi,
>Am Freitag, 29. November 2013, 11:22:29 schrieb Joachim Strömbergson: > >Hi Joachim, > >> Very cool. How does [1] compare functionally to jytter? >> http://jytter.blogspot.se/ > >I very briefly checked, but it seems that the author's consideration >takes interrupts and the like as the basis for the entropy. In >addition, he assumes that the prediction of some events cannot be done >with a good resolution. However, none of these considerations apply. Sorry, I meant, "none of these considerations apply to my RNG" > >My RNG is: > >rdtsc ><some small code> >rdtsc > >==> now you simply measure the execution time of the code. That time >shows variances. And I just pick them up and magnify them. > >The key is that you always have these varations on all kinds of CPUs. >And as mentioned before, I think the key reason is that the clock >cycles of the CPU mismatch with the RAM / Cache clock cycles. > >Ciao >Stephan Ciao Stephan _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
