[11260] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: building a true RNG

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Wed Jul 31 11:03:20 2002

Date: Wed, 31 Jul 2002 17:07:13 +1200 (NZST)
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: daw@cs.berkeley.edu, reinhold@world.std.com
Cc: barney@tp.databus.com, cryptography@wasabisystems.com,
	dahonig@cox.net, daw@mozart.cs.berkeley.edu, jsd@monmouth.com

David Wagner <daw@cs.berkeley.edu> writes:

>I once wrote a short note about the relevance of this to IPSec:
>http://www.cs.berkeley.edu/~daw/my-posts/using-prngs

There's another way to avoid this problem, which is to separate the nonce RNG
and crypto RNG, so that an attacker seeing the nonce RNG output can't use it
to attack the crypto RNG.  This is done in PGP 5.x and the cryptlib RNG.  OTOH
some RNGs are used in exactly the opposite manner, generating alternate public
and private random quantities, which make it possible to use one to infer
information about the other.  Examples are generators used with SSL and ssh,
which both alternate from public nonces to private session keys and back.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post