[129383] in cryptography@c2.net mail archive
Re: On the "randomness" of DNS
daemon@ATHENA.MIT.EDU (=?ISO-8859-1?Q?Philipp_G=FChring?=)
Thu Jul 31 09:51:22 2008
Date: Thu, 31 Jul 2008 11:28:43 +0200
From: =?ISO-8859-1?Q?Philipp_G=FChring?= <pg@futureware.at>
CC: cryptography@metzdowd.com
In-Reply-To: <4890BBAF.5080103@links.org>
X-MDaemon-Deliver-To: cryptography@metzdowd.com
Hi,
I would suggest to use http://www.cacert.at/random/ to test the
randomness of the DNS source ports. Due to the large variety of
random-number sources that have been tested there already, it's useful
as a classification service of unknown randomly looking numbers.
You just have to collect 12 MB of numbers from a DNS server and upload
it there. (If you get 2 Bytes per request, that's 6 million requests you
have to do)
>> I don't see the point of evaluating the quality of a random number
>> generator by statistical tests.
We successfully used statistical tests to detect broken random number
generators, we informed the vendors and they fixed them.
http://www.cacert.at/cgi-bin/rngresults
Best regards,
Philipp Gühring
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com