[Cryptography] cheap sources of entropy

John Kelsey crypto.jmk at gmail.com
Mon Feb 3 12:14:30 EST 2014


On Feb 2, 2014, at 10:34 PM, John Gilmore <gnu at toad.com> wrote:
> 
> So, if an attacker running malware in a hypervisor (or SMM) knew you
> were depending on disk drive timings for the random numbers that
> create your encryption keys, how easily could they attack you by
> rigidizing those interrupt timings, e.g. delaying your virtual machine
> interrupts at to the next even 1/60th of a second?

Maybe this is just my lack of understanding coming out, but I'm having a hard time seeing how any crypto code is going to remain secure if the hypervisor controlling the VM it's running on is under an attacker's control.  

>    John

--John 


More information about the cryptography mailing list