[12977] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Via puts RNGs on new processors

daemon@ATHENA.MIT.EDU (Bill Frantz)
Tue Apr 8 14:02:54 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
In-Reply-To: <200304081639.h38GdI206782@medusa01.cs.auckland.ac.nz>
Date: Tue, 8 Apr 2003 10:49:01 -0700
To: pgut001@cs.auckland.ac.nz (Peter Gutmann),
	cryptography@wasabisystems.com
From: Bill Frantz <frantz@pwpconsult.com>

At 9:39 AM -0700 4/8/03, Peter Gutmann wrote:
>"Perry E. Metzger" <perry@piermont.com> writes:
>
>>The new Via Technologies x86 clone processors appear to have on-board
>>cryptography support, including a hardware random number generator.
>
>It's not really "including a hardware RNG", that appears to be the sum total
>of the crypto support, at least as far as anyone's been able to find out.  The
>exact details of using the hardware RNG are only available under NDA from Via,
>although anyone who can somehow get their hands on an appropriate Nehemiah-
>core C3 to test with and the Cryptography Research tech report should be able
>to put something together.

I wonder if the instruction to read the RNG is privileged?  (Certain
systems want to be able to control/intercept all inputs to a process so
they can reproducibly rerun it later.  If the RNG is not privileged, then
these techniques can't be used on this processor.)

Cheers - Bill


-------------------------------------------------------------------------
Bill Frantz           | Due process for all    | Periwinkle -- Consulting
(408)356-8506         | used to be the         | 16345 Englewood Ave.
frantz@pwpconsult.com | American way.          | Los Gatos, CA 95032, USA



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post