[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6974210.pKFp51TpM6@tauon.atsec.com>
Date: Fri, 22 Apr 2016 06:59:32 +0200
From: Stephan Mueller <smueller@...onox.de>
To: Theodore Ts'o <tytso@....edu>
Cc: herbert@...dor.apana.org.au, linux-crypto@...r.kernel.org,
linux-kernel@...r.kernel.org, sandyinchina@...il.com
Subject: Re: [RFC][PATCH 0/6] /dev/random - a new approach
Am Donnerstag, 21. April 2016, 22:51:55 schrieb Theodore Ts'o:
Hi Theodore,
> I still have a massive problem with the claims that the "Jitter" RNG
> provides any amount of entropy. Just because you and I might not be
> able to analyze it doesn't mean that somebody else couldn't. After
> all, DUAL-EC DRNG was very complicated and hard to analyze. So would
> be something like
>
> AES(NSA_KEY, COUNTER++)
>
> Very hard to analyze indeed. Shall we run statistical tests? They'll
> pass with flying colors.
>
> Secure? Not so much.
If you are concerned with that RNG, we can easily drop it from the LRNG. The
testing documented in the writeup disable the Jitter RNG to ensure that only
the LRNG IRQ collection is tested.
The conclusions regarding timeliness of the seeding, the prevention of
draining the entropy pool are performed without the Jitter RNG which implies
that the Jitter RNG can be dropped without harm.
Ciao
Stephan
Powered by blists - more mailing lists