[148140] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] randomness +- entropy

daemon@ATHENA.MIT.EDU (James A. Donald)
Tue Nov 12 15:33:37 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 12 Nov 2013 18:23:51 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: John Denker <jsd@av8n.com>, cryptography@metzdowd.com, 
	RNG mlist <rng@lists.bitrot.info>
In-Reply-To: <5281CE40.40707@av8n.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2013-11-12 16:44, John Denker wrote:
> The fact is, there are some applications that cannot make do with
> low-quality randomness *and* cannot afford to wait.

I don't think so.

I think this is a configuration bug.  By the time you have completed the 
boot process, you have accumulated lots of entropy, and there is no 
cryptographic application so urgent it cannot wait for the boot process 
to complete.

However, some idiot puts a process needing true randomness early in the 
boot process for no good reason.

A process needing true randomness should fail by design in such case.


_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post