[16706] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: entropy depletion

daemon@ATHENA.MIT.EDU (William Allen Simpson)
Wed Jan 26 19:12:21 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 11 Jan 2005 13:48:56 -0500
From: William Allen Simpson <wsimpson@greendragon.com>
To: cryptography@metzdowd.com
In-Reply-To: <41E39D1A.10704@algroup.co.uk>

Ben Laurie wrote:

> William Allen Simpson wrote:
>
>>> Why then restrict it to non-communications usages?
>>
>> Because we are starting from the postulate that observation of the
>> output could (however remotely) give away information about the
>> underlying state of the entropy generator(s).
>
> Surely observation of /dev/urandom's output also gives away information?
>
ummm, no, not by definition.

/dev/random
  blocks on insufficient estimate of stored entropy
  useful for indirect measurement of system characteristics
  (assumes no PRNG)

/dev/urandom
  blocks only when insufficient entropy for initialization of state
  computationally infeasible to determine underlying state
  (assumes robust PRNG)

These are the definitions we've been using around here for many years. 
It does help when everybody is talking about the same things.

I'll note that many systems (including the MacOSX that I'm using to
write this) have made /dev/random and /dev/urandom the same....

-- 
William Allen Simpson
    Key fingerprint =  17 40 5E 67 15 6F 31 26  DD 0D B9 9B 6A 15 2C 32


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post