Linux RNG paper

Steven M. Bellovin smb at cs.columbia.edu
Thu May 4 13:06:38 EDT 2006


On Thu, 04 May 2006 18:14:09 +0200, markus reichelt <ml at mareichelt.de>
wrote:

> * "Travis H." <solinym at gmail.com> wrote:
> 
> > 1) In the paper, he mentions that the state file could be altered
> > by an attacker, and then he'd know the state when it first came up. 
> > Of course, if he could do that, he could simply install a trojan in
> > the OS itself, so this is not really that much of a concern.  If
> > your hard drives might be altered by malicious parties, you should
> > be using some kind of cryptographic integrity check on the contents
> > before using them.  This often comes for free when encrypting the
> > contents.
> 
> Agreed; but regarding unix systems, I know of none crypto
> implementation that does integrity checking. Not just de/encrypt the
> data, but verify that the encrypted data has not been tampered with.
> 
See "Space-Efficient Block Storage Integrity", Alina Oprea, Mike Reiter,
Ke Yang, NDSS 2005,
http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/storageint.pdf


--Steven M. Bellovin, http://www.cs.columbia.edu/~smb

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list