[149347] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

[Cryptography] Random numbers only once

daemon@ATHENA.MIT.EDU (Watson Ladd)
Tue Feb 4 00:18:04 2014

X-Original-To: cryptography@metzdowd.com
Date: Mon, 3 Feb 2014 21:12:55 -0800
From: Watson Ladd <watsonbladd@gmail.com>
To: Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

As DJB pointed out on another listhost, one only needs 256 random bits
once, and can then use a PRF to generate an indefinite number forever.
Why does /dev/random not do this and so avoid blocking after startup?
It wouldn't be that hard to write to a defined block of a disk image
these 32 random bytes.
Sincerely,
Watson Ladd
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post