[149257] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (James A. Donald)
Tue Jan 28 21:30:24 2014

X-Original-To: cryptography@metzdowd.com
Date: Wed, 29 Jan 2014 12:25:48 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: John Kelsey <crypto.jmk@gmail.com>, =?UTF-8?B?S3Jpc3p0acOhbiBQaW50w6ly?=
	<pinterkr@gmail.com>
In-Reply-To: <3DC831F2-9658-48B1-B9C8-E57D2A2D9EBF@gmail.com>
Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2014-01-29 12:09, John Kelsey wrote:
 > Unfortunately, pretty much all real-world systems
 > have some time (often very soon after their
 > first startup) when they have to generate some high value key.

Don't do that.   Should not even be possible to do that.

By the time boot up process is otherwise complete, should have enough 
entropy.

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post