[149161] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Tue Jan 21 13:31:55 2014

X-Original-To: cryptography@metzdowd.com
Date: Tue, 21 Jan 2014 20:57:21 +1300
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: cryptography@metzdowd.com, frantz@pwpconsult.com
In-Reply-To: <r422Ps-1075i-774A5D40C7544BD0B8C1D193A69C7210@Williams-MacBook-Pro.local>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

Bill Frantz <frantz@pwpconsult.com> writes:
>On 1/20/14 at 9:13 AM, crypto.jmk@gmail.com (John Kelsey) wrote:
>> The problem is, nobody makes *everything* they use.  A sufficiently
>> resourceful attacker might attack your device on all kinds of
>> levels, and you can't possibly check them all yourself.  
>
>Hmm, 12AX7s cost about $15 and burn a bunch of power. How many do I need to
>perform useful computation? Using the LGP-30 computer as an example, not very
>many. In any case, there is probably a simple enough technology where
>concerns about back doors devolve into pure paranoia.

If you're going to do that, you may as well go with relays:

http://web.cecs.pdx.edu/~harry/Relay/index.html

Or if you need something a bit faster, try the MT15:

http://6502.org/users/dieter/mt15/mt15.htm

All you need is about 3,000 BC547/557s.  Working at that level, you *can*
actually check everything yourself.

Peter.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post