[148444] in cryptography@c2.net mail archive
Re: [Cryptography] Fwd: [IP] 'We cannot trust' Intel and Via's
daemon@ATHENA.MIT.EDU (Kent Borg)
Fri Dec 13 15:40:50 2013
X-Original-To: cryptography@metzdowd.com
Date: Fri, 13 Dec 2013 14:37:07 -0500
From: Kent Borg <kentborg@borg.org>
To: cryptography@metzdowd.com
In-Reply-To: <86CC5021-CF61-4F42-83F3-C7CBC741C414@gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 12/13/2013 01:24 PM, John Kelsey wrote:
> Why not just XOR RD_RAND outputs with Yarrow outputs? That guarantees strong results if either one is good.
>
It might make even two bad inputs good. If rdrand has a backdoor it
still needs to leak state to its master. XORing in something way noisy
might be annoying to the masters.
-kb
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography