[4080] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Intel announcements at RSA '99

daemon@ATHENA.MIT.EDU (Colin Plumb)
Wed Jan 27 13:15:15 1999

Date: Tue, 26 Jan 1999 17:05:24 -0700 (MST)
From: Colin Plumb <colin@nyx.net>
To: colin@nyx.net, smb@research.att.com
Cc: ben@algroup.co.uk, cryptography@c2.net, geer@world.std.com,
        honig@sprynet.com, jamesd@echeque.com

>From smb@research.att.com  Tue Jan 26 16:18:13 1999
Return-Path: <smb@research.att.com>
Received: from mail-blue.research.att.com (mail-blue.research.att.com [135.207.30.102])
	by nyx10.nyx.net (8.8.8/8.8.8/esr) with ESMTP id QAA07772
	for <colin@nyx.net>; Tue, 26 Jan 1999 16:18:08 -0700 (MST)
X-Nyx-Envelope-Data: Date=Tue Jan 26 16:18:08 1999, Sender=smb@research.att.com, Recipient=<colin@nyx.net>, Valsender=mail-blue.research.att.com [135.207.30.102]
Received: from postal.research.att.com (postal.research.att.com [135.207.23.30])
	by mail-blue.research.att.com (Postfix) with ESMTP
	id 442AB4CEBD; Tue, 26 Jan 1999 18:18:07 -0500 (EST)
Received: from postal.research.att.com (localhost [127.0.0.1])
	by postal.research.att.com (8.8.7/8.8.7) with ESMTP id SAA12079;
	Tue, 26 Jan 1999 18:17:51 -0500 (EST)
Message-Id: <199901262317.SAA12079@postal.research.att.com>
To: Colin Plumb <colin@nyx.net>
Cc: ben@algroup.co.uk, geer@world.std.com, honig@sprynet.com,
        jamesd@echeque.com, cryptography@c2.net
Subject: Re: Intel announcements at RSA '99 
Date: Tue, 26 Jan 1999 18:17:50 -0500
From: Steve Bellovin <smb@research.att.com>
Status: R

Steve Bellovin wrote:
> What I was told at RSA was that the SHA-1 whitening was done by the driver.
> The driver (I think it was the driver, rather than the hardware) also does
> its own quality checks on the hardware RNG.

Ah, good, somebody at Intel gets the point.

>> (I'm also curious what people think is a good rate.  I think we surprised
>> them by saying that one bit per second was adequate.  Anything more can
>> be generated by cryptographic means.)

> I asked about speed; I was told that that isn't public yet.  I do not
> agree that one bit per second is adequate.  Apart from any question of
> the strength of the cryptographic RNG, it means that it would take many
> minutes to have enough entropy for even a single true-random DH exchange.
> Their own goal was "fast enough for IPSEC", which is not that fast, though
> more, I would guess, than your statement.

Yes, this is a number I do know (it came up in the same conversation),
and it's rather a lot more than 1 bit per second. :-)

But I still think that given a reasonable amount of seed material,
I can do cryptographic "reprocessing of spent fuel" basically forever
with good security.  More is nice, but I do think that 1 bit per second
is all that is *necessary* for 95% of the benefit.
-- 
	-Colin


home help back first fref pref prev next nref lref last post