linux random capabilities ...

2002-07-31 Thread Jean-Francois Dive
hello people, i was talking to a friend, and he was describing the inability of PC based security devices to have proper pseudo-random number generation. This sounds to me that i needed some investigation. My general question is: does someone ever heard about any type of cryptographic attack

Re: linux random capabilities ...

2002-07-31 Thread Adam Olsen
On Wed, Jul 31, 2002 at 07:51:03PM +1000, Jean-Francois Dive wrote: hello people, i was talking to a friend, and he was describing the inability of PC based security devices to have proper pseudo-random number generation. This sounds to me that i needed some investigation. My general

Re: linux random capabilities ...

2002-07-31 Thread Orlando
On Wednesday 31 July 2002 06:08, Adam Olsen wrote: Short answer: Linux mainly uses interrupt timings as an entropy source, from devices that are fairly unpredictable. Assuming those are secure, the entropy pool is protected by a SHA hash of it's state when something needs random bits.

Re: linux random capabilities ...

2002-07-31 Thread Sam Vilain
Jean-Francois Dive [EMAIL PROTECTED] wrote: i was talking to a friend, and he was describing the inability of PC based security devices to have proper pseudo-random number generation. This sounds to me that i needed some investigation. My general question is: does someone ever heard about

Re: linux random capabilities ...

2002-07-31 Thread Adam Olsen
On Wed, Jul 31, 2002 at 10:26:36AM -0500, Orlando wrote: On Wednesday 31 July 2002 06:08, Adam Olsen wrote: Short answer: Linux mainly uses interrupt timings as an entropy source, from devices that are fairly unpredictable. Assuming those are secure, the entropy pool is protected by a