[147046] in cryptography@c2.net mail archive
Re: [Cryptography] Random number generation influenced, HW RNG
daemon@ATHENA.MIT.EDU (Jerry Leichter)
Wed Sep 11 18:06:54 2013
X-Original-To: cryptography@metzdowd.com
From: Jerry Leichter <leichter@lrw.com>
In-Reply-To: <20130911132211.6fb61b74@jabberwock.cb.piermont.com>
Date: Wed, 11 Sep 2013 17:56:07 -0400
To: Perry E. Metzger <perry@piermont.com>
Cc: cryptography@metzdowd.com, jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On Sep 11, 2013, at 1:22 PM, Perry E. Metzger <perry@piermont.com> wrote:
>> Let us consider that source of colored noise with which we are most
>> familiar: The human voice. Efforts to realistically simulate a
>> human voice have not been very successful. The most successful
>> approach has been the ransom note approach....
> I don't think this is true....
It isn't. See http://www.kth.se/en/csc/forskning/small-visionary-projects/tidigare-svp/fa-en-konstgjord-rost-att-lata-som-en-riktig-manniska-1.379755
On the underlying issue of whether a software model of a hardware RNG could be accurate enough for ... some not-quite-specified purpose: Gate-level simulation of circuits is a simple off-the-shelf technology. If the randomness is coming from below that, you need more accurate simulations, but *no one* builds a chip these days without building a detailed physical model running in a simulator first. The cost of getting it wrong would be way too large. Some levels of the simulation use public information; at some depth, you probably get into process details that would be closely held.
Since it's not clear exactly how you would use this detailed model to, say, audit a real hardware generator, it's not clear just how detailed a model you would need.
-- Jerry
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography