[12978] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Via puts RNGs on new processors

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Tue Apr 8 14:03:31 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Wed, 9 Apr 2003 05:57:14 +1200
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: cryptography@wasabisystems.com, frantz@pwpconsult.com,
	pgut001@cs.auckland.ac.nz

Bill Frantz <frantz@pwpconsult.com> writes:
>At 9:39 AM -0700 4/8/03, Peter Gutmann wrote:
>>"Perry E. Metzger" <perry@piermont.com> writes:
>>
>>>The new Via Technologies x86 clone processors appear to have on-board
>>>cryptography support, including a hardware random number generator.
>>
>>It's not really "including a hardware RNG", that appears to be the sum total
>>of the crypto support, at least as far as anyone's been able to find out.  The
>>exact details of using the hardware RNG are only available under NDA from Via,
>>although anyone who can somehow get their hands on an appropriate Nehemiah-
>>core C3 to test with and the Cryptography Research tech report should be able
>>to put something together.
>
>I wonder if the instruction to read the RNG is privileged?  (Certain systems
>want to be able to control/intercept all inputs to a process so they can
>reproducibly rerun it later.  If the RNG is not privileged, then these
>techniques can't be used on this processor.)

XSTORE is unprivileged.

Peter.


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post