[149317] in cryptography@c2.net mail archive
Re: [Cryptography] cheap sources of entropy
daemon@ATHENA.MIT.EDU (Bill Stewart)
Mon Feb 3 01:41:26 2014
X-Original-To: cryptography@metzdowd.com
Date: Sun, 02 Feb 2014 22:22:24 -0800
To: cryptography@metzdowd.com
From: Bill Stewart <bill.stewart@pobox.com>
In-Reply-To: <52EECC9F.3030600@echeque.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
At 02:54 PM 2/2/2014, James A. Donald wrote:
>We only need 128 bits of entropy, every now and then. We are not
>going the be cpu bound all the time, and we are certainly not going
>to be cpu bound when the system is first turned on.
I'm not too worried about the "every now and then" case. It's an
issue, but it's one that gives you time to watch lots of fairly
random stuff before you need a result. Even CPU randomness is probably enough.
I'm mainly worried about the "new virtual machine, cloned from a
standard image" case,
which needs to set up ssh keys, ssl keys, and seed /dev/random before
it's ready to deal with the rest of the world
in ways that would give it some more entropy to work with.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography