[149313] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (Bill Frantz)
Mon Feb 3 00:01:06 2014

X-Original-To: cryptography@metzdowd.com
Date: Sun,  2 Feb 2014 20:36:04 -0800
From: Bill Frantz <frantz@pwpconsult.com>
To: cryptography@metzdowd.com
In-Reply-To: <201402030334.s133YlFT009166@new.toad.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

My experience with working on several OS kernels is that OS 
scheduling is a black art. Its a lot more arcane than cryptography.

If I were working on the scheduler for a modern VM hypervisor, I 
would spend considerable effort trying to maximize the 
efficiency of the L1 and L2 caches. Disk I/O just doesn't count. 
If you have to wait for a disk operation, you're in a long-term 
penalty box.

Now, if you can measure program execution time accurately enough 
to determine the L1 and L2 cache misses, they might be a good 
source of bits unknown to outside observers. :-)

Cheers - Bill

-----------------------------------------------------------------------
Bill Frantz        | I like the farmers' market   | Periwinkle
(408)356-8506      | because I can get fruits and | 16345 
Englewood Ave
www.pwpconsult.com | vegetables without stickers. | Los Gatos, 
CA 95032

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post