[Cryptography] [RNG] on RNGs, VM state, rollback, etc.

Nemo nemo at self-evident.org
Sun Oct 20 13:56:56 EDT 2013


John Kelsey <crypto.jmk at gmail.com> writes:

> What would break if /dev/random became something that only provided
> cryptographic strength random bits instead of full entropy bits, but
> never blocked except at startup?

What would break is the /dev/random maintainers' brains.

This exact same discussion comes up every 5-10 years. At some point, one
or more people who actually know something about cryptography give a
critique of the unanalyzable continuously moving target that is Linux
/dev/random.

For example:

https://lkml.org/lkml/2005/4/14/61

And every time, the Linux /dev/random maintainer(s) demonstrate why
he/they should never be allowed anywhere near cryptographic code.

Good luck fixing this.

 - Nemo
   https://self-evident.org/


More information about the cryptography mailing list