[149266] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (Bill Stewart)
Wed Jan 29 21:52:04 2014

X-Original-To: cryptography@metzdowd.com
Date: Wed, 29 Jan 2014 15:30:06 -0800
To: cryptography@metzdowd.com
From: Bill Stewart <bill.stewart@pobox.com>
In-Reply-To: <52E98202.3090408@av8n.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


> > If it is a digital thermostat, has an A to D converter.  If an A to D
> > converter, probably has thermal noise.

A digital thermostat typically has a 10 or 12 bit A/D converter,
at least if it's an Internet of Things home-type thermostat.
Not much thermal noise available there.

>One well-calibrated well-defended well-monitored entropy source
>makes incomparably more sense than an arbitrarily complicated
>conglomeration of sucky sources.

But one entropy source, however well-defended, means that if
there's a problem you can't defend against, it's toast.
Being well-monitored means that a RNG bug when setting your SSH key gets
         "kernel panic in /dev/random at line 32767 - core dumped"
printed neatly on the console DECwriter,
which is probably better than setting it to "00000000" or "NaN"
because at least it failed securely,
while if you've got multiple sources of mediocre entropy,
your boot time takes a few seconds or minutes longer but works.


_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post