[147941] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] What's a Plausible Attack On Random Number

daemon@ATHENA.MIT.EDU (Yaron Sheffer)
Fri Nov 1 13:48:19 2013

X-Original-To: cryptography@metzdowd.com
Date: Fri, 01 Nov 2013 13:04:45 +0200
From: Yaron Sheffer <yaronf.ietf@gmail.com>
To: John Gilmore <gnu@toad.com>, Jerry Leichter <leichter@lrw.com>
In-Reply-To: <201311010404.rA144HqQ020831@new.toad.com>
Cc: "cryptography@metzdowd.com List" <cryptography@metzdowd.com>,
	David Mercer <radix42@gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-11-01 06:04, John Gilmore wrote:
>> So actually the "beacon" should be done differently.  Every existing
>> system that already has access to randomness, will periodically
>> multicast some "random bits".  A newly booted system is able to see
>> this stuff (it will have to know where to look, of course).  The
>> bits themselves aren't particularly useful, but the timing
>> information should be.
>
> This is sort of like "BOOTP for RNGs".  It sounds like an interesting
> R&D project.  Deliberately relying on external inputs (even the timing
> of external inputs) invites attackers, of course.  And spraying output
> from your well-fed RNG out to the world invites a different class of
> attackers.  Which is why this is more like a multi-year research
> effort as opposed to an implement-it-and-forget-it service.
>
It sounds like a quick addition to DHCP - an extension that gets you 256 
bits from the server, would solve 99% of the problem we have with 
embedded devices. It will not be sufficient for high-security 
environments, because an attacker might be listening on the local LAN, 
but it will provide the entropy we need to initialize SSH, TLS, IPsec. 
And it is much better than relying on fixed information (MAC address 
etc.) and a few bits of timing.

Looks very much like an "implement it, standardize it and forget it" 
kind of thing to me.

Thanks,
	Yaron
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post