[147888] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] My comments regarding using CPU jitter for

daemon@ATHENA.MIT.EDU (Bill Frantz)
Wed Oct 30 00:02:32 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 29 Oct 2013 20:47:02 -0700
From: Bill Frantz <frantz@pwpconsult.com>
To: cryptography@metzdowd.com
In-Reply-To: <20131028230343.GA31699@thunk.org>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 10/28/13 at 4:03 PM, tytso@mit.edu wrote:

>Maybe someone can prove that there is more entropy because of some
>instability between the oscillator used by the CPU clock and the one
>used by the ethernet NIC, and so I'm being hopelessly
>over-conservative.  Perhaps; but until we know for sure, using a
>similar analysis to what I described above, I'd much rather be slow
>than be potentially insecure.

And in 5 years time, someone will build hardware that uses the 
same oscillator for both the CPU clock and the Ethernet NIC, 
doing to clock jitter entropy what solid state disks did to Don 
Davis' "Cryptographic randomness from air turbulence in disk 
drives" approach.

Cheers - Bill

-----------------------------------------------------------------------
Bill Frantz        | Truth and love must prevail  | Periwinkle
(408)356-8506      | over lies and hate.          | 16345 
Englewood Ave
www.pwpconsult.com |               - Vaclav Havel | Los Gatos, 
CA 95032

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post