[148016] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] What's a Plausible Attack On Random Number

daemon@ATHENA.MIT.EDU (Richard Outerbridge)
Tue Nov 5 12:22:06 2013

X-Original-To: cryptography@metzdowd.com
From: Richard Outerbridge <outer@sympatico.ca>
In-Reply-To: <20131104233241.14C6DE0A0@a-pb-sasl-quonix.pobox.com>
Date: Tue, 5 Nov 2013 00:00:17 -0500
To: Bill Stewart <bill.stewart@pobox.com>
Cc: Jerry Leichter <leichter@lrw.com>, Yaron Sheffer <yaronf.ietf@gmail.com>,
	"cryptography@metzdowd.com List" <cryptography@metzdowd.com>,
	John Gilmore <gnu@toad.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-11-02 (306), at 02:33:05, Bill Stewart <bill.stewart@pobox.com> wro=
te:

> At 07:21 AM 11/1/2013, Jerry Leichter wrote:
>> On Nov 1, 2013, at 7:04 AM, Yaron Sheffer <yaronf.ietf@gmail.com> wrote:

[=85.]

etc, etc.

Make it like an electrical fuse?

For heaven=92s sake, why not just a sensor next to and in line with the phy=
sical on/off switch like a hyper sensitive geiger counter, and widely avail=
able sources of benign radioactives, linked to a machine register?

The machine couldn=92t even turn itself on until it was random enough.  Wou=
ld that be an acceptably low-level and early enough blocking State for suff=
iciently random seeds for all practical purposes?
__outer


_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post