| |
Log in / Subscribe / Register

Re: [RFC][PATCH 0/6] /dev/random - a new approach

From:  Theodore Ts'o <tytso-AT-mit.edu>
To:  Stephan Mueller <smueller-AT-chronox.de>
Subject:  Re: [RFC][PATCH 0/6] /dev/random - a new approach
Date:  Thu, 21 Apr 2016 22:51:55 -0400
Message-ID:  <20160422025155.GA6690@thunk.org>
Cc:  herbert-AT-gondor.apana.org.au, linux-crypto-AT-vger.kernel.org, linux-kernel-AT-vger.kernel.org, sandyinchina-AT-gmail.com
Archive‑link:  Article

 I still have a massive problem with the claims that the "Jitter" RNG provides any amount of entropy. Just because you and I might not be able to analyze it doesn't mean that somebody else couldn't. After all, DUAL-EC DRNG was very complicated and hard to analyze. So would be something like AES(NSA_KEY, COUNTER++) Very hard to analyze indeed. Shall we run statistical tests? They'll pass with flying colors. Secure? Not so much.	- Ted 



Copyright © 2016, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds