[149069] in cryptography@c2.net mail archive
Re: [Cryptography] [cryptography] Boing Boing pushing an RSA
daemon@ATHENA.MIT.EDU (Bill Stewart)
Wed Jan 15 23:51:40 2014
X-Original-To: cryptography@metzdowd.com
Date: Wed, 15 Jan 2014 17:11:31 -0800
To: Cryptography <cryptography@metzdowd.com>,cryptography@randombit.net
From: Bill Stewart <bill.stewart@pobox.com>
In-Reply-To: <52D6B73F.30701@borg.org>
Cc: Steve Furlong <demonfighter@gmail.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
>On 01/15/2014 10:38 AM, Steve Furlong wrote:
>>On Wed, Jan 15, 2014 at 9:15 AM, Kent Borg 
>><<mailto:kentborg@borg.org>kentborg@borg.org> wrote:
>> > OTP has always ranged from difficult to impractical to securely 
>> deploy, and
>> > the larger system where OTP is used will offer targets for attack, but
>> > one-time-pads themselves are compromised??
>>
>>Compromised PRNGs.
If you have a PRNG or DRBG, compromised or not, you don't have a OTP, 
you have a stream cypher of whatever quality level, subject to 
mathematical attack.  Maybe it's a good stream cypher, like BBS with 
a seed you protected well, maybe it's the random() function in your 
ROM's BASIC interpreter, maybe you're doing good tradecraft to handle 
distribution and use of the pseudorandom bits or maybe you're not, 
but it's not a one-time pad.
Compromised on-chip hardware randomness generators, giving you a 
stream that claims to be thermal noise but is actually 
DES(clock,NSAkey)?  Yeah, that's something you thought was a 
legitimate OTP, just like you thought the pad you generated by 
flipping coins (not knowing there was a KGB Ceiling Cat Camera 
Watching You) was a legitimate OTP.  But for that attack you blame 
Intel, not RSA.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography