[Cryptography] cheap sources of entropy
James A. Donald
Jamesd at echeque.com
Sat Feb 1 16:58:58 EST 2014
> At 02:33 PM 1/31/2014, James A. Donald wrote:
>> If you are on a VM, probably have a disk drive with turbulence.
On 2014-02-02 06:38, Bill Stewart wrote:
> Definitely not. If you're on a VM, you have 0..n virtual disk drives,
> which the hypervisor simulates from a datastore pool and maybe some cache.
Underneath all that are real material disk drives, which have
turbulence. The turbulence causes random and entirely unpredictable
timing variations, which unpredictability and variation propagate all
the way to the VM
> You don't get any access to the real device, even though the
> hardware drivers look like they're talking to a disk.
You don't need direct access to the real device. The the real
turbulence in the real device causes random variation in the time that
your buffer gets filled. So just hash the cpu clock into your
stockpile of randomness every time that you read data that is likely to
need to come from disk. And then your VM is reading real randomness
from real turbulence on the real disk.
More information about the cryptography