Intel 810 Random Number Generator

Sandy Harris sandy en storm.ca
Mar Ene 25 01:49:58 CST 2000


Gregory Maxwell wrote:

> In this case, we can play the paranoid and just mix it in and not
> increase the entropy count.
> 
> If the current 'twisted crc32 mixer thingy' doesn't provide that your
> entropy can never go down even with NSA input data, then we need ones > that does.

Any reversible binary operation -- a XOR b, a + b, encrypt a with
key b, ... -- provides that.

The attacker doesn't know a before the operation. Afterward, if he
knows b and the result and the operation is reversible, then he can
recover a. Therefore the result contains at least as much information
unknown to the attacker (=at least as much entropy) as a did.

The point of the twisting is to spread the incoming entropy around
the pool a bit. Down at the lowest level, it uses XOR to mix so it
cannot reduce entropy, whatever the input data.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo en vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



Más información sobre la lista de distribución Ayuda