[5220] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: depleting the random number generator

daemon@ATHENA.MIT.EDU (bram)
Mon Jul 26 14:23:56 1999

Date: Mon, 26 Jul 1999 10:18:05 -0700 (PDT)
From: bram <bram@gawth.com>
To: "James A. Donald" <jamesd@echeque.com>
Cc: David Wagner <daw@cs.berkeley.edu>, cryptography@c2.net
In-Reply-To: <199907261413.HAA22696@proxy3.ba.best.com>

On Mon, 26 Jul 1999, James A. Donald wrote:

> > Oh dear!  This suggestion worries me.
> > Is it reasonable to expect this arrangement to be secure
> > against e.g. chosen-entropy attacks?
> 
> Yes:  If the attacker knows exactly when the packets arrive (which he
> cannot) this cannot give him any additional knowledge about the state.

The threat model for yarrow and other SRNG's is that the attacker can not
only tell when entropy is coming in, but control it's contents as well.
The idea is to build something which only fails if the attacker both knows
the state of the pool at some point and manages to control all attempted
reseedings.

-Bram



home help back first fref pref prev next nref lref last post