[147849] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] [RNG] on RNGs, VM state, rollback, etc.

daemon@ATHENA.MIT.EDU (James A. Donald)
Sat Oct 26 01:34:32 2013

X-Original-To: cryptography@metzdowd.com
Date: Sat, 26 Oct 2013 05:23:48 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <C33C2CB7-C08E-4F66-B2DD-7CFECB3F7B3D@gmail.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-10-25 22:12, John Kelsey wrote:
 > This gets back to the threat model discussion.  If your attacker is
 > watching you from the outside as you generate your key, then
 > interacting with stuff over the local net won't help you much.

 > (You may get a bit or two of entropy from the attacker not being
 > able to know exactly which clock-tick you were on when the interrupt
 > was serviced, but not much.).

It does not take very long to get 128 interrupts.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post