[149257] in cryptography@c2.net mail archive
Re: [Cryptography] cheap sources of entropy
daemon@ATHENA.MIT.EDU (James A. Donald)
Tue Jan 28 21:30:24 2014
X-Original-To: cryptography@metzdowd.com
Date: Wed, 29 Jan 2014 12:25:48 +1000
From: "James A. Donald" <jamesd@echeque.com>
To: John Kelsey <crypto.jmk@gmail.com>, =?UTF-8?B?S3Jpc3p0acOhbiBQaW50w6ly?=
<pinterkr@gmail.com>
In-Reply-To: <3DC831F2-9658-48B1-B9C8-E57D2A2D9EBF@gmail.com>
Cc: "cryptography@metzdowd.com" <cryptography@metzdowd.com>
Reply-To: jamesd@echeque.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On 2014-01-29 12:09, John Kelsey wrote:
> Unfortunately, pretty much all real-world systems
> have some time (often very soon after their
> first startup) when they have to generate some high value key.
Don't do that. Should not even be possible to do that.
By the time boot up process is otherwise complete, should have enough
entropy.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography