[5211] in cryptography@c2.net mail archive
Re: depleting the random number generator
daemon@ATHENA.MIT.EDU (David Wagner)
Mon Jul 26 00:06:57 1999
To: cryptography@c2.net
From: daw@cs.berkeley.edu (David Wagner)
Date: 25 Jul 1999 13:49:19 -0700
In article <v04011700b3c0b0807cfc@[24.218.56.100]>,
Arnold G. Reinhold <reinhold@world.std.com> wrote:
> One nice advantage of using RC4 as a nonce generator is that you can easily
> switch back and forth between key setup and code byte generation. You can
> even do both at the same time. (There is no need to reset the index
> variables.) This allows you to intersperse entropy deposits and withdrawals
> at will.
Oh dear! This suggestion worries me.
Is it reasonable to expect this arrangement to be secure
against e.g. chosen-entropy attacks?