[149240] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (Tom Mitchell)
Mon Jan 27 18:04:35 2014

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <E1W5WD3-0007nL-2F@login01.fos.auckland.ac.nz>
Date: Mon, 27 Jan 2014 14:44:42 -0800
From: Tom Mitchell <mitch@niftyegg.com>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com>,
	Bill Frantz <frantz@pwpconsult.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Mon, Jan 20, 2014 at 11:57 PM, Peter Gutmann
<pgut001@cs.auckland.ac.nz> wrote:
> Bill Frantz <frantz@pwpconsult.com> writes:
>>On 1/20/14 at 9:13 AM, crypto.jmk@gmail.com (John Kelsey) wrote:
>>> The problem is, nobody makes *everything* they use.  A sufficiently
>>> resourceful attacker might attack your device on all kinds of
>>> levels, and you can't possibly check them all yourself.
>>
>>Hmm, 12AX7s cost about $15 and burn a bunch of power. How many do I need to
>>perform useful computation?
.....
> Or if you need something a bit faster, try the MT15:
>
> http://6502.org/users/dieter/mt15/mt15.htm
>
> All you need is about 3,000 BC547/557s.  Working at that level, you *can*
> actually check everything yourself.

200 chips in Magic-1
http://www.homebrewcpu.com/

You need a system....  consider the need for
memory, I/O and tools.

Magic-1 is as close to this discussion goal as I know.
It is a hardware system one mind can grock.





-- 
  T o m    M i t c h e l l
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post