[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <146E2283-8336-4FE1-A38D-896CEB21EFE0@doxpara.com>
Date: Sat, 25 Dec 2010 14:43:49 -0800
From: Dan Kaminsky <dan@...para.com>
To: BMF <badmotherfsckr@...il.com>
Cc: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>
Subject: Re: how i stopped worrying and loved the backdoor
Sent from my iPhone
On Dec 25, 2010, at 2:38 PM, BMF <badmotherfsckr@...il.com> wrote:
> On Sat, Dec 25, 2010 at 2:12 PM, <cpolish@...ewest.net> wrote:
>> Check out Markus Jacobsson et al, "A Practical Secure Physical Random
>> Bit Generator", 1998, using the turbulence of airflow inside the drive
>> as the source of randomness. Can't do much better than that.
>
> I read that when it came out. I am quite familiar with turbulent
> boundary layers. Nobody sells hardware (hard drives, in this case)
> which actually implements the technique. All of my original queries
> still stand.
Making noisy diodes isn't all that hard, AFAIK. You eliminate bias by only returning difference bits -- 01 is a 0, 10 is a 0. Whether the underlying silicon is in fact doing that...well, that's a question for the chip reversers.
>
> BMF
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists