[147097] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Random number generation influenced, HW RNG

daemon@ATHENA.MIT.EDU (James A. Donald)
Fri Sep 13 12:39:16 2013

X-Original-To: cryptography@metzdowd.com
Date: Thu, 12 Sep 2013 09:35:08 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: "Perry E. Metzger" <perry@piermont.com>
In-Reply-To: <20130911132211.6fb61b74@jabberwock.cb.piermont.com>
Cc: cryptography@metzdowd.com
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-09-12 3:22 AM, Perry E. Metzger wrote:
> I don't think this is true. Typically, the noise sources being used in 
> hardware RNGs are very simple physical processes like shot noise. I 
> think simulations of those are vastly simpler than simulations of 
> human voices.

The circuit allegedly used in the Intel chip will produce a signal 
substantially more complex than that.

Indeed any noise circuit, even one based on shot noise or Johnson noise 
has numerous analog aspects that will alter the color of the noise, just 
as the human voice is more than just a vibrating vocal cord.

And this color will change from one chip to the next, will change with 
temperature, will change with overclocking.  Where does the digital 
simulation get a true on chip clock to know that its overclocking is 
being changed on it?

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post