[Cryptography] Mac OS 10.7.5 Random Numbers
agr at me.com
Tue Feb 4 19:30:37 EST 2014
On Mon, 3 Feb 2014 11:24 John Kelsey <crypto.jmk at gmail.com> wrote:
> What attack do you think is made practical by having only a 160-bit PRNG state, instead of a 256-bit state?
NSA requires 256-bit AES keys for top secret. Assuming they have some good reason, a user who believes their data deserves the same level of protection and naively generates such a key using the 160-bit state RNG will not get the security they expect.
> Any validation process you come up with is going to have the same feature: once you've gotten something validated, changing it is, in general, going to mess up your validation. Otherwise the validation means nothing, because you could get a crypto device validated using RSA2048 and SHA256, and then change it over to using RSA512 and MD5.
There is a long history of crypto primitives becoming obsolete as technology and crypto analysis progresses. So new primitives are developed from time to time and old ones depreciated. Ideally the depreciated primitives should be replaced well before there is any exploitable weakness. The validation process should not be an obstacle to such deployment. Perhaps there should be an expedited validation for recommended upgrades or maybe validations should have a limited life time to force periodic review.
In this case it seems that Apple picked wisely back in 1999 when it selected Yarrow and got a solution that still offers good security after 15 years, but I think their users would be better served if they made a simple upgrade. Yes, I know they have tons of cash, but there is always competition for budget. I wouldn't doubt their technical people have suggested such a change and some manager vetoed it on the grounds they are still FIPS-140 certified. That's a problem.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the cryptography