[Cryptography] Is Ron right on randomness
waywardgeek at gmail.com
Mon Nov 28 11:46:54 EST 2016
On Sun, Nov 27, 2016 at 11:02 AM, ianG <iang at iang.org> wrote:
> On 26/11/2016 09:38, Salz, Rich wrote:
>> Absolutely right. Only TRNGs that make raw data available should be
>>> trusted. Further, the source should have a simple physical model which is
>>> proven out by measurements, preferably continuously.
>> Meanwhile, back in the real world... What should OpenSSL do, given the
>> wide number of platforms and huge uninformed community that depends on it,
> It should read from /dev/urandom 
Ian, would you agree that something on the platform needs to first ensure
that /dev/random is well seeded before OpenSSL reads from /dev/urandom? I
suggested perhaps OpenSSL should read 1024 bits from /dev/random, and all
later bits from /dev/urandom, but then every app that needs
cryptographically unpredictable numbers would each independently reseed the
Maybe Linux could provide a way to read total entropy generated since
boot? That could be used to compute how much data to read from
/dev/random, and in most cases it would be 0.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the cryptography