[5248] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: depleting the random number generator -- repeated state

daemon@ATHENA.MIT.EDU (Jon Callas)
Tue Jul 27 20:20:04 1999

In-Reply-To: <v0401170cb3c37a1cdbe1@[24.218.56.100]>
Date: Tue, 27 Jul 1999 15:22:14 -0700
To: cryptography@c2.net
From: Jon Callas <jon@callas.org>

I built a PRNG that used an RC4 variant as John Kelsey said. The thing is
also actually very Yarrow-like. I modified it later to use a state array
512 long instead of 256 long, just so it would have a larger entropy pool.

When I added more entropy, I added entropy using the same basic algorithm
as RC4 key setup. The difference was that the S-array was not 0..256, but
whatever the state of the array was. You simply *don't* use the input
mechanism that Anonymous described.

I'll also note that the state-loop that Anonymous described can easily be
detected and corrected. Given that this is a PRNG, not a cipher,
predictability is not a requirement (although you can algorithmically
correct in a way that will still make it a cipher).

Someday, I need to update the Entropy Manager (as I called it) and
re-release it.

	Jon





home help back first fref pref prev next nref lref last post