Dan Kaminsky <[EMAIL PROTECTED]> writes:
>For example, the following construction:
>
>Start with an RNG. Retrieve 64K of "random data". Assume there might be a
>bias somewhere in there, but that at least 256 bits are good. SHA-256 the
>data. AES-256 encrypt the data with the result from the SHA
David Wagner <[EMAIL PROTECTED]> writes:
> Crawford Nathan-HMGT87 writes:
>>One of the problems with the Linux random number generator
>>is that it happens to be quite slow, especially if you need a lot of
>>data.
>
> /dev/urandom is blindingly fast. For most applications, that's
> all you need.
On Wed, 13 Feb 2008, Dave Korn wrote:
> On 11 February 2008 17:37, Crawford Nathan-HMGT87 wrote:
> > I'm wondering if they've considered the possibility of EMI skewing
> > the operation of the device, or other means of causing the device
> > to genearate "less than completely random" numbers.
>
>
"Steven M. Bellovin" <[EMAIL PROTECTED]> writes:
>Remember the Clipper chip?
Clipper (or more specifically Capstone, via the Fortezza card) is a great
example of the NSA's sound engineering approach to generating random data [0].
They used a physical randomness source of an unpublished type, pres
Peter Gutmann wrote:
> "David G. Koontz" <[EMAIL PROTECTED]> writes:
>
>
>> Military silicon already has RNG on chip (e.g. AIM, Advanced INFOSEC Machine,
>> Motorola),
>>
>
> That's only a part of it. Military silicon has a hardware RNG on chip
> alongside a range of other things because
On Wed, 13 Feb 2008 20:38:49 -0800
[EMAIL PROTECTED] wrote:
>
> > - Original Message -
> > From: "Pat Farrell" <[EMAIL PROTECTED]>
> > To:
> > Subject: Re: Toshiba shows 2Mbps hardware RNG
> > Date: Sun, 10 Feb 2008 17:40:19 -0500
&
On Feb 10, 2008, at 4:02 AM, Peter Gutmann wrote:
The device generates random numbers at a data rate of 2.0 megabits
a second, according to Toshiba in a paper presented at the
International Solid-State Circuits Conference (ISSCC) here.
I've always wondered why RNG speed is such a big deal f
> - Original Message -
> From: "Pat Farrell" <[EMAIL PROTECTED]>
> To:
> Subject: Re: Toshiba shows 2Mbps hardware RNG
> Date: Sun, 10 Feb 2008 17:40:19 -0500
>
>
> Perry E. Metzger wrote:
> > [EMAIL PROTECTED] (Peter Gutmann) writes:
>
"David G. Koontz" <[EMAIL PROTECTED]> writes:
>Military silicon already has RNG on chip (e.g. AIM, Advanced INFOSEC Machine,
>Motorola),
That's only a part of it. Military silicon has a hardware RNG on chip
alongside a range of other things because they know full well that you can't
trust only a
On 11 February 2008 17:37, Crawford Nathan-HMGT87 wrote:
>> EE Times: Toshiba tips random-number generator IC
>>
>> SAN FRANCISCO -- Toshiba Corp. has claimed a major breakthrough in
>> the field of security technology: It has devised the world's
>> highest-performance physical random-numbe
| > SAN FRANCISCO -- Toshiba Corp. has claimed a major breakthrough in
| > the field of security technology: It has devised the world's
| > highest-performance physical random-number generator (RNG)
| > circuit.
| >
| > The device generates random numbers at a data rate of 2.0 megabits
|
>EE Times: Toshiba tips random-number generator IC
>
> SAN FRANCISCO -- Toshiba Corp. has claimed a major breakthrough in
> the field of security technology: It has devised the world's
> highest-performance physical random-number generator (RNG)
> circuit.
>
> The device generates random
Danilo Gligoroski <[EMAIL PROTECTED]> writes:
>At 04:02 AM 2/10/2008, Peter Gutmann wrote:
>>"Perry E. Metzger" <[EMAIL PROTECTED]> writes:
>>
>><\snip
>>So your potential market for this is people running Monte Carlo simulations
>>who don't like PRNGs. Seems a bit of a limited market...
>
>I thin
[EMAIL PROTECTED] ("Hal Finney") writes:
>When the Intel RNG came out several years ago, built into the bus controller
>chipset, it was not widely accepted by the cryptographic community due to
>fears of back doors or internal weaknesses. A generally positive analysis by
>Cryptographic Research (h
Hal Finney wrote:
>
> Looking at the block diagram for the new Toshiba circuit, and comparing
> with the Intel design, one concern I have is with attacks on the device
> via external electromagnetic fields which could modulate current flows
> and potentially influence internal random numbers. Inte
Perry E. Metzger wrote:
[EMAIL PROTECTED] (Peter Gutmann) writes:
I've always wondered why RNG speed is such a big deal for anything but a few
highly specialised applications.
Perhaps it isn't, but any hardware RNG is probably better than none
for many apps, and they've managed to put the whol
[EMAIL PROTECTED] (Peter Gutmann) writes:
> I've always wondered why RNG speed is such a big deal for anything but a few
> highly specialised applications.
Perhaps it isn't, but any hardware RNG is probably better than none
for many apps, and they've managed to put the whole thing in a quite
smal
At 07:02 PM 2/9/2008, Peter Gutmann wrote:
I've always wondered why RNG speed is such a big deal for anything but a few
highly specialised applications. For security use you've got two options:
1. Use it with standard security protocols, in which case you need all of 128
or so bits every now
When the Intel RNG came out several years ago, built into
the bus controller chipset, it was not widely accepted by the
cryptographic community due to fears of back doors or internal
weaknesses. A generally positive analysis by Cryptographic Research
(http://www.cryptography.com/intelRNG.pdf) faile
At 04:02 AM 2/10/2008, Peter Gutmann wrote:
"Perry E. Metzger" <[EMAIL PROTECTED]> writes:
<\snip
So your potential market for this is people running Monte Carlo simulations
who don't like PRNGs. Seems a bit of a limited market...
I think that the market is a little bit bigger than just appli
"Perry E. Metzger" <[EMAIL PROTECTED]> writes:
>EE Times: Toshiba tips random-number generator IC
>
> SAN FRANCISCO -- Toshiba Corp. has claimed a major breakthrough in
> the field of security technology: It has devised the world's
> highest-performance physical random-number generator (RNG)
21 matches
Mail list logo