[Cryptography] Dieharder & symmetric cryptosystems
Michel Arboi
michel.arboi at gmail.com
Thu Mar 10 09:00:54 EST 2022
Hello,
Sorry for awakening an old thread but it appears that miscellaneous changes
to /dev/random or /dev/urandom during the last couple of years did not
fundamentally fix what I noticed in 2019, supposing that this apparent
weakness needed fixing.
(In summary, some WEAK results appeared very often on some specific tests
with the /dev/urandom generator, while they never appeared with
/dev/random, or very rarely)
The main change is that /dev/random is now "as weak" as /dev/urandom,
probably because of this:
https://www.phoronix.com/scan.php?page=news_item&px=Linux-5.6-Random-Rework
Considering that the old /dev/random or other PRNG do not exhibit this
behaviour, I suspect some kind of weakness here. I still could not find any
explanation.
$ dieharder -a -g 500
#=============================================================================#
# dieharder version 3.31.1 Copyright 2003 Robert G. Brown
#
#=============================================================================#
rng_name |rands/second| Seed |
/dev/random| 1.47e+07 | 97623993|
#=============================================================================#
test_name |ntup| tsamples |psamples| p-value |Assessment
#=============================================================================#
diehard_birthdays| 0| 100| 100|0.98853103| PASSED
[snip]
sts_serial| 10| 100000| 100|0.83110218| PASSED
sts_serial| 10| 100000| 100|0.99559169| WEAK
<-------------- here
sts_serial| 11| 100000| 100|0.98425140| PASSED
[snip]
sts_serial| 15| 100000| 100|0.99501524| WEAK
[snip]
rgb_lagged_sum| 14| 1000000| 100|0.47229376| PASSED
rgb_lagged_sum| 15| 1000000| 100|0.99950974| WEAK
[snip]
Preparing to run test 209. ntuple = 0
dab_monobit2| 12| 65000000| 1|0.25934883| PASSED
$ dieharder -a -g 501
#=============================================================================#
# dieharder version 3.31.1 Copyright 2003 Robert G. Brown
#
#=============================================================================#
rng_name |rands/second| Seed |
/dev/urandom| 7.84e+06 |3770177091|
#=============================================================================#
test_name |ntup| tsamples |psamples| p-value |Assessment
#=============================================================================#
diehard_birthdays| 0| 100| 100|0.48144031| PASSED
[snip]
diehard_sums| 0| 100| 100|0.00896211| PASSED
diehard_runs| 0| 100000| 100|0.00135805| WEAK
diehard_runs| 0| 100000| 100|0.32971394| PASSED
[snip]
diehard_runs| 0| 100000| 100|0.00135805| WEAK
[snip]
sts_serial| 3| 100000| 100|0.00381696| WEAK
[snip]
sts_serial| 13| 100000| 100|0.99985868| WEAK
[snip]
rgb_lagged_sum| 22| 1000000| 100|0.00401025| WEAK
[snip]
$
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20220310/75517cbd/attachment.htm>
More information about the cryptography
mailing list