[148444] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Fwd: [IP] 'We cannot trust' Intel and Via's

daemon@ATHENA.MIT.EDU (Kent Borg)
Fri Dec 13 15:40:50 2013

X-Original-To: cryptography@metzdowd.com
Date: Fri, 13 Dec 2013 14:37:07 -0500
From: Kent Borg <kentborg@borg.org>
To: cryptography@metzdowd.com
In-Reply-To: <86CC5021-CF61-4F42-83F3-C7CBC741C414@gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 12/13/2013 01:24 PM, John Kelsey wrote:
> Why not just XOR RD_RAND outputs with Yarrow outputs?  That guarantees strong results if either one is good.
>

It might make even two bad inputs good. If rdrand has a backdoor it 
still needs to leak state to its master.  XORing in something way noisy 
might be annoying to the masters.

-kb

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post