[129503] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: On "randomness"

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Mon Aug 4 16:27:14 2008

From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: ben@links.org, jsd@av8n.com
Cc: cryptography@metzdowd.com, pedagand@gmail.com
In-Reply-To: <4890EE60.2080605@av8n.com>
Date: Fri, 01 Aug 2008 17:38:28 +1200

John Denker <jsd@av8n.com> writes:

>  *) At the other extreme, there are many high-stakes business,
>   military, and gambling applications where I would agree with 
>   von Neumann, and would shun absolutely all PRNGs.  I would 
>   rely exclusively on _hardware_ randomness generators, as
>   detailed at:
>      http://www.av8n.com/turbid/

I would never rely *exclusively* on any source because then a failure in your 
exclusive source, no matter how magical it is, will bring down your entire 
system.  Use a hardware RNG if you want to, but also XOR in the output from a 
PRNG, and a block cipher in counter mode, and a MAC of the time.  And apply 
the NIST tests on the data you're using, and on the generator output.  And 
don't forget to do [...].

A good randomness/key generator is more an engineering problem than an 
algorithmic one.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post