[148402] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Fwd: [IP] 'We cannot trust' Intel and Via's

daemon@ATHENA.MIT.EDU (Bill Cox)
Wed Dec 11 01:38:51 2013

X-Original-To: cryptography@metzdowd.com
Date: Tue, 10 Dec 2013 21:35:39 -0500
From: Bill Cox <waywardgeek@gmail.com>
To: cryptography@metzdowd.com
In-Reply-To: <CAHWD2rKjFLYOvs4QdcovVfG2O=r6O7+efxgXgHRY6WXjObVA0w@mail.gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

I just had an email asking about possible patent issues with using 
Intel's entropy circuit.  Well, IANAL, but I skimmed the 86 patents 
Intel has so far that mention RNG, and they don't cover the entropy 
source.  They did patent all the crud they do to the data once it leaves 
the entropy source, but I think no one will mind if I don't do any of 
that.  I've read a ton of patents, and am listed as an inventor on 25.  
I could be wrong, but I doubt it.

So, feel free to copy Intel's back-to-back inverter entropy source, at 
least until they publish a patent that does cover it.

I think my main concerns using Intel's back-to-back inverters as an RNG 
is how to fix it... connecting the inverters supply through a clocked 
PMOS directly to VDD is stupid.  I'd be very surprised if they actually 
did that.  Hopefully I wont violate any patents while figuring out how 
to fix that.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post