[148402] in cryptography@c2.net mail archive
Re: [Cryptography] Fwd: [IP] 'We cannot trust' Intel and Via's
daemon@ATHENA.MIT.EDU (Bill Cox)
Wed Dec 11 01:38:51 2013
X-Original-To: cryptography@metzdowd.com
Date: Tue, 10 Dec 2013 21:35:39 -0500
From: Bill Cox <waywardgeek@gmail.com>
To: cryptography@metzdowd.com
In-Reply-To: <CAHWD2rKjFLYOvs4QdcovVfG2O=r6O7+efxgXgHRY6WXjObVA0w@mail.gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
I just had an email asking about possible patent issues with using
Intel's entropy circuit. Well, IANAL, but I skimmed the 86 patents
Intel has so far that mention RNG, and they don't cover the entropy
source. They did patent all the crud they do to the data once it leaves
the entropy source, but I think no one will mind if I don't do any of
that. I've read a ton of patents, and am listed as an inventor on 25.
I could be wrong, but I doubt it.
So, feel free to copy Intel's back-to-back inverter entropy source, at
least until they publish a patent that does cover it.
I think my main concerns using Intel's back-to-back inverters as an RNG
is how to fix it... connecting the inverters supply through a clocked
PMOS directly to VDD is stupid. I'd be very surprised if they actually
did that. Hopefully I wont violate any patents while figuring out how
to fix that.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography