[147757] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] [RNG] on RNGs, VM state, rollback, etc.

daemon@ATHENA.MIT.EDU (James A. Donald)
Sun Oct 20 01:26:14 2013

X-Original-To: cryptography@metzdowd.com
Date: Sun, 20 Oct 2013 11:10:22 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <20131019212255.GA10047@jis.tzo.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-10-20 07:22, Jeffrey I. Schiller wrote:
> That is a value judgment, one where you let security be more important 
> than anything else. That is a mistake.

The completely broken system is fixable, usually trivially fixable, and 
once fixed, will stay fixed.

Maybe we need three sources of randomness: Ordinary random, never 
blocks, somewhat predictable.  Cryptographically random, blocks during 
boot up, unpredictable to adversaries.  True random.  Blocks 
frequently.  On some systems, with limited sources of randomness, may 
block a lot.  Truly unpredictable.

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post