[149341] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (James A. Donald)
Mon Feb 3 19:37:39 2014

X-Original-To: cryptography@metzdowd.com
Date: Tue, 04 Feb 2014 09:11:05 +1000
From: "James A. Donald" <Jamesd@echeque.com>
To: Ben Laurie <ben@links.org>, Tom Mitchell <mitch@niftyegg.com>
In-Reply-To: <CAG5KPzyMwSd-HG67HQSDp=bevTS-iaYN_eYUXVDqSOABg1B7xg@mail.gmail.com>
Cc: Jerry Leichter <leichter@lrw.com>,
	"cryptography@metzdowd.com" <cryptography@metzdowd.com>,
	Bill Stewart <bill.stewart@pobox.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 2014-02-04 08:28, Ben Laurie wrote:
> HOLY CRAP! Enough of the rhetoric. Has anyone measured anything, or is
> this all opinion?

Well I looked at the timing data on a few systems for the crypto Kong 
randomness collector, and they passed the eyeball test.  Looked like 
there was a shitload[1] of entropy there

[1] a shitload being several pooploads.


_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post