[148163] in cryptography@c2.net mail archive
Re: [Cryptography] randomness +- entropy
daemon@ATHENA.MIT.EDU (James A. Donald)
Wed Nov 13 14:53:06 2013
X-Original-To: cryptography@metzdowd.com
Date: Wed, 13 Nov 2013 20:40:01 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <20131113015827.9C24EF38A@a-pb-sasl-quonix.pobox.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 2013-11-13 11:54, Bill Stewart wrote:
> Most applications can wait. Some of them could wait, but currently don't.
> But what applications are there that really do need to run early?
>
> The one potential example I can think of is hard drive encryption -
> it definitely needs good (pseudo)randomness,
Initially it decrypts, so does not need randomness.
Pretty soon however, write needs to be available. But if one has an
encrypted file system, that is pretty good grounds for storing a pool
of randomness on disk and trusting that that pool is unknown to the
adversary.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography