On 17.01.2012 23:55, Peter Waltenberg wrote:

> I think my point is valid though - even if it is a PRNG, provided it's a
> good one (and distribution will tell you that) if an attacker can't tell
> exactly when you are sampling the PRNG effectively it's a usable entropy
> source.

One of the problems is for example to get a suitably random number
soon after booting an embedded device, without external activity.
A PRNG is no good here - the sampling occurs at quite predictable
time since the power was applied.

For a typical OpenSSL usage you are probably right, at least if you
are able to save the gathered entropy across reboots.

> The same is true of events we consider to be really random - i.e.
> radioactive material, thermal shot noise - the real situation may simply be
> that we don't yet know enough at present  to be able to predict when an
> indivdual nucleus will decay - that doesn't mean that'll always be true

Well if this assumption breaks the RNGs will be probably the least
thing to worry about ;)

-- 
                                        Stano
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to