[4078] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Intel announcements at RSA '99

daemon@ATHENA.MIT.EDU (Eric Murray)
Wed Jan 27 13:07:25 1999

Date: Wed, 27 Jan 1999 08:18:54 -0800
From: Eric Murray <ericm@lne.com>
To: Colin Plumb <colin@nyx.net>
Cc: smb@research.att.com, ben@algroup.co.uk, cryptography@c2.net,
        geer@world.std.com, honig@sprynet.com, jamesd@echeque.com
In-Reply-To: <199901270005.RAA10056@nyx10.nyx.net>; from Colin Plumb on Tue, Jan 26, 1999 at 05:05:24PM -0700

On Tue, Jan 26, 1999 at 05:05:24PM -0700, Colin Plumb wrote:
> Steve Bellovin wrote:
> > What I was told at RSA was that the SHA-1 whitening was done by the driver.
> > The driver (I think it was the driver, rather than the hardware) also does
> > its own quality checks on the hardware RNG.
> 
> Ah, good, somebody at Intel gets the point.

It's the only way- the chip processes which produce randomness
aren't understood well by fab process people, and the h/w rng isn't
testable on the production line.... chip test machines only deal
with known inputs and outputs.

Also, the h/w rng could possibly fail in use.  So periodic
testing is required (for some applicable value of 'periodic' and 'testing').

> But I still think that given a reasonable amount of seed material,
> I can do cryptographic "reprocessing of spent fuel" basically forever
> with good security.  More is nice, but I do think that 1 bit per second
> is all that is *necessary* for 95% of the benefit.

You need to have a large enough pool of random seed material at some
point very soon after startup, in case the user boots and immediately
runs a transaction or some other process which needs random numbers.
So it would need to have a higher rate just to cover immediate
use after boot.  In a system with a disk you can keep a random pool
around between boots, reducing the first-time problem to the first
boot-up.  But that's not an option in embedded or diskless situations.

-- 
Eric Murray          N*Able Technologies                    www.nabletech.com
(email:  ericm  at the sites lne.com or nabletech.com)     PGP keyid:E03F65E5


home help back first fref pref prev next nref lref last post