Re: [cryptography] RDRAND and Is it possible to protect against malicious hw accelerators?

2011-06-21 Thread Marsh Ray
On 06/21/2011 12:18 PM, Ian G wrote: On 18/06/11 8:16 PM, Marsh Ray wrote: On 06/18/2011 03:08 PM, slinky wrote: But we know there are still hundreds of trusted root CAs, many from governments, that will silently install themselves into Windows at the request of any website. Some of

Re: [cryptography] RDRAND and Is it possible to protect against malicious hw accelerators?

2011-06-21 Thread Jeffrey Walton
On Tue, Jun 21, 2011 at 1:18 PM, Ian G i...@iang.org wrote: On 18/06/11 8:16 PM, Marsh Ray wrote: On 06/18/2011 03:08 PM, slinky wrote:  But we know there are still hundreds of trusted root CAs, many from governments, that will silently install themselves into Windows at the request of

Re: [cryptography] RDRAND and Is it possible to protect against malicious hw accelerators?

2011-06-20 Thread Jack Lloyd
On Sun, Jun 19, 2011 at 04:56:34PM +1200, Peter Gutmann wrote: I know how to check the carry flag from inline asm, I just don't know what the rdrand encoding is. Here's the code I sent to the OP, I hadn't posted it yet because I need to get someone with access to the appropriate hardware

Re: [cryptography] RDRAND and Is it possible to protect against malicious hw accelerators?

2011-06-20 Thread Thierry Moreau
Peter Gutmann wrote: Marsh Ray ma...@extendedsubset.com writes: So the Intel DRNG has observable shared internal state and is shared among multiple cores. The rule for security there is that if an attacker can get physical access to the same CPU as you, you're toast via any number of