Intel 810 Random Number Generator
H. Peter Anvin
hpa en transmeta.com
Mie Ene 26 08:03:57 CST 2000
Followup to: <200001260115.UAA08354 en tsx-prime.MIT.EDU>
By author: "Theodore Y. Ts'o" <tytso en MIT.EDU>
In newsgroup: linux.dev.kernel
>
> P.S. If you look at the Jun and Kocher paper (thanks to Colin Plumb for
> giving me a pointer to it:
>
> http://developer.intel.com/design/security/rng/CRIwp.htm
>
> It's clear that there is a hardware whitener (a von Neumann bias
> eliminator) to remove 0 vs 1 biases. There are hints that it's
> possible to turn off the whitener, so that you get access to the raw
> stream of bits from the RNG before any whitening is done.
> Unfortunately, how to actually do this (probably some kind of debug
> mode) doesn't seem to be published anywhere. If any one knows how to do
> this, please let me know. Ideally, if the software is going to be doing
> real-time verification of the RNG's soundness, it should be doing so on
> the pre-whitened data stream. As an example, the following string of
> numbers is anything but random:
>
> 1 2 3 4 5 6 7 8 9 10
>
> However, if this is run through a MD5 or SHA whitener, the result would
> *look* random, even though the source material is anything but random.
> So you really want to look for patters and do any analysis on the raw
> data stream.
>
> So, if anyone can figure out (and tell me) how to turn off the 810's
> hardware whitener circuits, that would be really useful. Thanks!!
>
What a waste of transistors! The hardware whitener probably takes far
more transistors than the circuit itself, and it's not even a good
idea...
-hpa
--
<hpa en transmeta.com> at work, <hpa en zytor.com> in private!
"Unix gives you enough rope to shoot yourself in the foot."
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo en vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/
Más información sobre la lista de distribución Ayuda