[149103] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (ianG)
Sat Jan 18 08:06:49 2014

X-Original-To: cryptography@metzdowd.com
Date: Sat, 18 Jan 2014 11:17:17 +0300
From: ianG <iang@iang.org>
To: cryptography@metzdowd.com
In-Reply-To: <1390014255.22018.71.camel@excessive.dsl.static.sonic.net>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 18/01/14 06:04 AM, Bear wrote:

> Hmm.  It should not be too difficult to equip many servers in the same
> room with $10 USB cameras, and have them all pointed at a cheap,
> known-chaotic physical system like an aquarium with a bubbling filter,
> moving aquarium toys, and swimming fish -- all from different angles -- 
> running the resulting video, a half-second at a time, through a hash
> function, and using the results for "real" random numbers.  And it 
> amuses me that the sysadmin's job could legitimately include feeding
> the fish.


Jon Callas (I think) a long time ago suggested pointing your cheapo USB
camera at a photographer's grey card in low light.  The theory is that
the cells in a camera seek for information and if they don't see
something that is worth reporting, it drives them a little tipsy.  The
claim is that this effect can drive them into some form of quantum
uncertainty.

When we were creating a CAcert root key at one stage, I used this
technique to deliver one of the independent feeds.  I wrote a shell
script to take a photo once a second, and sha it into a log file.
Examination with Mark-I eyeball of the photos and shas didn't reveal any
artifacts, and the results at any one point were certainly chaotic.

(In the same exercise, we XOR mixed in Linux's RNG and John Denker's
audio.  The goal was to have each person bring in an independent stream,
and then examine the XOR program to ensure it was clean.  About 2 pages
worth of simple C.)

Open question:  What do people think of the production of big important
keys using the old compliance method of "must use a HSM" now ?

iang
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post