[13004] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Via puts RNGs on new processors

daemon@ATHENA.MIT.EDU (Ben Laurie)
Thu Apr 10 11:06:10 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Wed, 09 Apr 2003 20:26:13 +0100
From: Ben Laurie <ben@algroup.co.uk>
To: David Wagner <daw@mozart.cs.berkeley.edu>
Cc: cryptography@wasabisystems.com
In-Reply-To: <b71dph$roa$1@abraham.cs.berkeley.edu>

David Wagner wrote:
> Ian Grigg  wrote:
> 
>>My world view would be that there is no such
>>thing as an acceptable off-the-shelf RNG.
> 
> 
> Why not?  You rely on an off-the-shelf CPU, don't you?
> The CPU must be trusted just as much as the RNG.
> 
> 
>>If one is relying on some commercially acceptable
>>rating, then one has also to ensure that the
>>entire distribution chain - how you got that
>>chip - is also safe.  If there are such things
>>as "good" Via chips alongside "bad" Via chips,
>>how do we know that a bad chip wasn't substituted
>>in at the last moment?
> 
> 
> Do you worry about this for your CPU?  If not, why should
> the RNG component of your CPU be any different?

It seems clear to me that its hard to subvert a general CPU such that it 
does predictable damage to randomness. However, the same cannot be said 
about a hardware RNG.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post