[Cryptography] [RNG] on RNGs, VM state, rollback, etc.
Nemo
nemo at self-evident.org
Sun Oct 20 13:56:56 EDT 2013
John Kelsey <crypto.jmk at gmail.com> writes:
> What would break if /dev/random became something that only provided
> cryptographic strength random bits instead of full entropy bits, but
> never blocked except at startup?
What would break is the /dev/random maintainers' brains.
This exact same discussion comes up every 5-10 years. At some point, one
or more people who actually know something about cryptography give a
critique of the unanalyzable continuously moving target that is Linux
/dev/random.
For example:
https://lkml.org/lkml/2005/4/14/61
And every time, the Linux /dev/random maintainer(s) demonstrate why
he/they should never be allowed anywhere near cryptographic code.
Good luck fixing this.
- Nemo
https://self-evident.org/
More information about the cryptography
mailing list