[149339] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (James A. Donald)
Mon Feb 3 19:36:11 2014

X-Original-To: cryptography@metzdowd.com
Date: Tue, 04 Feb 2014 08:54:42 +1000
From: "James A. Donald" <Jamesd@echeque.com>
To: John Kelsey <crypto.jmk@gmail.com>, Jerry Leichter <leichter@lrw.com>
In-Reply-To: <51891D57-6166-49BE-BBC5-45B7858EE099@gmail.com>
Cc: Bill Stewart <bill.stewart@pobox.com>,
	"cryptography@metzdowd.com" <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

This is a multi-part message in MIME format.
--===============2069145336863445969==
Content-Type: multipart/alternative;
 boundary="------------070403010209080008090105"

This is a multi-part message in MIME format.
--------------070403010209080008090105
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

On 2014-02-04 03:12, John Kelsey wrote:
> d.  Code developed and even tested for one environment run on some new environment, and don't get any entropy.
We don't actually know this.  By and large, the added complexity 
provides added sources of random variation and unpredictability, rather 
than suppressing existing random variation and complexity.

The case where turbulence induced timing variation would be lost is a 
system that is fully cpu bound, and not IO bound.  In such case, cache 
hits and cache misses would depend on what all the other processes are 
doing, which other processes are themselves dealing with things out 
there, that have random variation, thus, random variation in cache hits 
and cache misses, resulting timing variation dependent on all the real 
external things that all the other processes have to deal with.

We can only measure turbulence randomness in a very simple, very 
controlled system /because in a realistic system, there are a lot of 
other sources of randomness/.

--------------070403010209080008090105
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    <div class="moz-cite-prefix">On 2014-02-04 03:12, John Kelsey wrote:<br>
    </div>
    <blockquote
      cite="mid:51891D57-6166-49BE-BBC5-45B7858EE099@gmail.com"
      type="cite">
      <pre wrap="">d.  Code developed and even tested for one environment run on some new environment, and don't get any entropy. </pre>
    </blockquote>
    We don't actually know this.&nbsp; By and large, the added complexity
    provides added sources of random variation and unpredictability,
    rather than suppressing existing random variation and complexity.<br>
    <br>
    The case where turbulence induced timing variation would be lost is
    a system that is fully cpu bound, and not IO bound.&nbsp; In such case,
    cache hits and cache misses would depend on what all the other
    processes are doing, which other processes are themselves dealing
    with things out there, that have random variation, thus, random
    variation in cache hits and cache misses, resulting timing variation
    dependent on all the real external things that all the other
    processes have to deal with.<br>
    <br>
    We can only measure turbulence randomness in a very simple, very
    controlled system <i>because in a realistic system, there are a lot
      of other sources of randomness</i>.<br>
  </body>
</html>

--------------070403010209080008090105--

--===============2069145336863445969==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============2069145336863445969==--

home help back first fref pref prev next nref lref last post