Timeline for Entropy of two concatenated random values
Current License: CC BY-SA 3.0
5 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Jul 22, 2015 at 11:38 | comment | added | otus | @dannycrane, internally, the Intel RNG splits the 128-bit values that it gets out of AES into two 64-bit random numbers each. The final 512-bit value may begin with either a full 128-bit AES output or the latter half of one. That adds another bit of freedom. Whether you consider it a full bit of entropy depends on what you assume the attacker knows. | |
| Jul 21, 2015 at 6:00 | comment | added | drdot | If your entropy in the RNG is 256 bits and you dump it into a PRNG, then by concatenating two 256 bit values generate from the PRNG, the entropy should be 256 bit correct? Could you elaborate on how you get 257 bits entropy? Also where is the 640-bit value coming from in your explanation? | |
| Aug 13, 2014 at 8:42 | history | edited | otus | CC BY-SA 3.0 | number was wrong |
| Aug 12, 2014 at 7:19 | history | edited | otus | CC BY-SA 3.0 | note on mixing |
| Aug 12, 2014 at 6:32 | history | answered | otus | CC BY-SA 3.0 |