Intel to also add RNG

Matt Crawford crawdad at fnal.gov
Mon Jul 12 12:46:22 EDT 2010


On Jul 12, 2010, at 11:22 AM, Perry E. Metzger wrote:

> The
> literature makes it clear at this point that short of carefully
> tearing apart and analyzing the entire chip, you're not going to catch
> subtle behavioral changes designed to allow attackers backdoor
> access.

I happen to be re-reading Vernor Vinge's _A Deepness in the Sky_ right now. In it, a conquering power needs to use the computing and communication technology of its subjugated foe, and has unusual resources to carry out a thorough code audit. However, the foe has been hiding secrets since before the victors were fooling with electricity ...

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 1889 bytes
Desc: not available
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20100712/369246f3/attachment.bin>


More information about the cryptography mailing list