Re: [cryptography] urandom vs random

2013-08-20 Thread ianG
On 20/08/13 03:46 AM, Peter Gutmann wrote: shawn wilson ag4ve...@gmail.com writes: It's not like they're the only ones that sell these, but they /were/ the only ones to sell USB PRNG at $800. You can get them for as little as $50 in the form of USB-key media players running Android. Or if

Re: [cryptography] urandom vs random

2013-08-20 Thread Peter Gutmann
ianG i...@iang.org writes: On a related point, what name do we give to the design/pattern for entropy sources == mix/pool == deterministic expansion function ? The standard way to do things? Or a standard CSPRNG (continually seeded PRNG). Peter.

Re: [cryptography] urandom vs random

2013-08-20 Thread Alan Braggins
On 20 August 2013 01:46, Peter Gutmann pgut...@cs.auckland.ac.nz wrote: I don't see what the point is though, given that there's more than enough noisy data available on a general-purpose PC. A general purpose cloud VM where an attacker has a chance to run his VM on the same underlying hardware

Re: [cryptography] urandom vs random

2013-08-20 Thread James A. Donald
On 2013-08-20 1:31 AM, ianG wrote: It's a recurring theme -- there doesn't seem to be enough market demand for Hardware RNGs. Every microphone is a hardware RNG ___ cryptography mailing list cryptography@randombit.net

Re: [cryptography] urandom vs random

2013-08-20 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 20/08/13 07:08, ianG wrote: On a related point, what name do we give to the design/pattern for entropy sources == mix/pool == deterministic expansion function ? I was asked this seconds after tasking my intern to build one :-/ Seems like

Re: [cryptography] urandom vs random

2013-08-20 Thread Shawn Wilson
Not exactly. I think havaged is better at this as you're relying on the same type of data but with a single source. I also don't believe you want a microphone inline in order to do this. You should rely purely on electric noise with the ADC/mixer. I don't even think the volume level affects the

[cryptography] Preventing Time Correlation Attacks on Leaks: Help! :-)

2013-08-20 Thread Fabio Pietrosanti (naif)
Hi all, at GlobaLeaks we are going to implement a feature that want to mitigate time correlation attacks between a Whistleblower submitting something and a Receiver, receiving a notification that there's a new leak outstanding to be accessed. We already had a internal discussion and received

Re: [cryptography] urandom vs random

2013-08-20 Thread grarpamp
The subject thread is covering a lot about OS implementations and RNG various sources. But what are the short list of open source tools we should be using to actually test and evaluate the resulting number streams? ___ cryptography mailing list

Re: [cryptography] urandom vs random

2013-08-20 Thread Natanael
Most regular people can't accurately test or evaluate the output. Numbers aren't random, the sources are. You can't just judge a PRNG by it's output. For all you know the PRNG could be doing nothing more than doing SHA256 of a fixed value plus a counter, and if somebody would know that fixed value

Re: [cryptography] urandom vs random

2013-08-20 Thread grarpamp
On Tue, Aug 20, 2013 at 5:58 PM, Natanael natanae...@gmail.com wrote: For all you know the PRNG could be doing nothing more than doing SHA256 of a fixed value plus a counter Yes, and in an application where even that trivial design would serve to fit some use, testing the apparent randomness.of

Re: [cryptography] urandom vs random

2013-08-20 Thread James A. Donald
On 2013-08-21 7:33 AM, grarpamp wrote: The subject thread is covering a lot about OS implementations and RNG various sources. But what are the short list of open source tools we should be using to actually test and evaluate the resulting number streams?

Re: [cryptography] urandom vs random

2013-08-20 Thread Open eSignForms
We all know that randomness is required for good crypto, but what is the a measurable difference in the quality of the crypto if using a Linux PRNG (or in our case the Java SecureRandom PRNG)? How much easier is it to crack an encrypted file done with such weaker PRNGs compared to the hardware

[cryptography] Jingle and Otr

2013-08-20 Thread James A. Donald
Jingle supports voice, video, and text messaging. OTR is a reasonably user friendly encryption system, or at least less user hostile than most, that, unlike skype, does not suffer a central point of failure pidgin supports both jingle and otr, as well as just about everything else in the

Re: [cryptography] Preventing Time Correlation Attacks on Leaks: Help! :-)

2013-08-20 Thread Peter Maxwell
Hi Fabio, While I don't mean to be dismissive, I suspect your threat model is flawed for the following reasons: i. Most mid to large companies would not permit the use of Tor within their infrastructure and even if the hypothetical company did, it doesn't take a whole lot of effort to track down

Re: [cryptography] Jingle and Otr

2013-08-20 Thread Natanael
https://jitsi.org/Documentation/ZrtpFAQ ZRTP and the GNU ZRTP implementation provide features to communication programs to setup of secure audio and video session without additional infrastructure, server programs, registration, and alike. While this doesn't state outright that Jitsi uses ZRTP

Re: [cryptography] Jingle and Otr

2013-08-20 Thread Peter Saint-Andre
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 8/20/13 8:31 PM, Natanael wrote: https://jitsi.org/Documentation/ZrtpFAQ ZRTP and the GNU ZRTP implementation provide features to communication programs to setup of secure audio and video session without additional infrastructure, server

Re: [cryptography] Jingle and Otr

2013-08-20 Thread James A. Donald
On 2013-08-21 12:33 PM, Peter Saint-Andre wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 8/20/13 8:31 PM, Natanael wrote: https://jitsi.org/Documentation/ZrtpFAQ ZRTP and the GNU ZRTP implementation provide features to communication programs to setup of secure audio and video session

Re: [cryptography] Jingle and Otr

2013-08-20 Thread Natanael
Well, the point here is that ZRTP for video and voice pretty much is functionally equivalent to OTR for IM. OTR is designed for messages, ZRTP is designed for data streams. 2013/8/21 James A. Donald jam...@echeque.com: On 2013-08-21 12:33 PM, Peter Saint-Andre wrote: -BEGIN PGP SIGNED

Re: [cryptography] Jingle and Otr

2013-08-20 Thread James A. Donald
On 2013-08-21 2:00 PM, Natanael wrote: Well, the point here is that ZRTP for video and voice pretty much is functionally equivalent to OTR for IM. OTR is designed for messages, ZRTP is designed for data streams. Ah yes, I see: I was thinking of the problem from a text point of view, where