[149308] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (James A. Donald)
Sun Feb 2 18:12:02 2014

X-Original-To: cryptography@metzdowd.com
Date: Mon, 03 Feb 2014 08:54:23 +1000
From: "James A. Donald" <Jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <52EE15FD.7000108@iang.org>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


We only need 128 bits of entropy, every now and then.  We are not going 
the be cpu bound all the time, and we are certainly not going to be cpu 
bound when the system is first turned on.

And if we are cpu bound all the time, there will still be timing 
randomness because all the other vms are dealing with things in the real 
world that are random and unpredictable.


_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post