[148026] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] What's a Plausible Attack On Random Number

daemon@ATHENA.MIT.EDU (Michael Rogers)
Tue Nov 5 12:29:47 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 05 Nov 2013 14:41:56 +0000
From: Michael Rogers <michael@briarproject.org>
To: Kent Borg <kentborg@borg.org>, Yaron Sheffer <yaronf.ietf@gmail.com>
In-Reply-To: <kmltj62xasascklyhm6aimk5.1383512947483@email.android.com>
Cc: Jerry Leichter <leichter@lrw.com>,
	"cryptography@metzdowd.com List" <cryptography@metzdowd.com>,
	John Gilmore <gnu@toad.com>, David Mercer <radix42@gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 03/11/13 21:09, Kent Borg wrote:
> Yaron Sheffer suggested:
>> Suppose I'm an (entropy) poor home router in an (entropy) poor
>> home, with just one desktop machine behind me. We could have the
>> PC send some random material in the DHCP *request*, and the
>> router is free to mix it into its very shallow entropy pool.
> 
> Starting to sound so neighborly: whenever you think a neighbor
> could maybe use some entropy, offer a little.  (To be mixed with
> other sources!)

ICMP echo has a data field...

Cheers,
Michael

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJSeQO0AAoJEBEET9GfxSfMH2EH/RnYpX15oWH38O8HXJ4YRz9m
gbG9jns9avJZaCNwfKmY/wWBIJzKTE9stmhIy0Dyh4G2c/LcJ4FN4rm4O0UCAoOQ
pgf0vCc83saScP69lWEphKJtiGoKuab2zmWceddTq5O9GJGbvhFZhkR1/5AoATsV
rYyO5Pv5rueGVKGLULKYFyG+id3EfigxDAwtUBpCwHxXdvjBNpQ2CF7kFSO9ea2x
wGMGqccjhFGM+JZSZ6JJcAVLMO21RtJdKPvX2alTkHXkfd+NTNN81gIPkyfO7RdD
d/f12gWnrZZzf/g9rRfpJbPrhUaadV3YUHDtStANggKq2hC24br/v7wqK3JTETI=
=RCYV
-----END PGP SIGNATURE-----
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post