[147757] in cryptography@c2.net mail archive
Re: [Cryptography] [RNG] on RNGs, VM state, rollback, etc.
daemon@ATHENA.MIT.EDU (James A. Donald)
Sun Oct 20 01:26:14 2013
X-Original-To: cryptography@metzdowd.com
Date: Sun, 20 Oct 2013 11:10:22 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <20131019212255.GA10047@jis.tzo.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 2013-10-20 07:22, Jeffrey I. Schiller wrote:
> That is a value judgment, one where you let security be more important
> than anything else. That is a mistake.
The completely broken system is fixable, usually trivially fixable, and
once fixed, will stay fixed.
Maybe we need three sources of randomness: Ordinary random, never
blocks, somewhat predictable. Cryptographically random, blocks during
boot up, unpredictable to adversaries. True random. Blocks
frequently. On some systems, with limited sources of randomness, may
block a lot. Truly unpredictable.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography