[149308] in cryptography@c2.net mail archive
Re: [Cryptography] cheap sources of entropy
daemon@ATHENA.MIT.EDU (James A. Donald)
Sun Feb 2 18:12:02 2014
X-Original-To: cryptography@metzdowd.com
Date: Mon, 03 Feb 2014 08:54:23 +1000
From: "James A. Donald" <Jamesd@echeque.com>
To: cryptography@metzdowd.com
In-Reply-To: <52EE15FD.7000108@iang.org>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
We only need 128 bits of entropy, every now and then. We are not going
the be cpu bound all the time, and we are certainly not going to be cpu
bound when the system is first turned on.
And if we are cpu bound all the time, there will still be timing
randomness because all the other vms are dealing with things in the real
world that are random and unpredictable.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography