[5338] in cryptography@c2.net mail archive
Re: linux-ipsec: Re: Proposal (was Summary re: /dev/random)
daemon@ATHENA.MIT.EDU (John D. Hardin)
Tue Aug 3 19:26:44 1999
Date: Mon, 2 Aug 1999 15:30:03 -0700 (PDT)
From: "John D. Hardin" <jhardin@wolfenet.com>
To: David Honig <honig@sprynet.com>
Cc: Sandy Harris <sandy.harris@sympatico.ca>, cryptography@c2.net,
linux-ipsec@clinet.fi
In-Reply-To: <3.0.5.32.19990802102709.007d2e30@pop.sprynet.com>
On Mon, 2 Aug 1999, David Honig wrote:
> There are measures of entropy you could use, e.g.,
> Maurer's Universal Statistical Test. The problem is
> how to fit them into the OS without bogging down
> the system, or not responding adequately to the
> interrupts.
...so we need a userspace program that grabs some bits, figures out
how much entropy they contain, feeds the bits into the pool and
updates the /dev/random entropy counter using the ioctl calls posted
earlier.
--
John Hardin KA7OHZ jhardin@wolfenet.com
pgpk -a finger://gonzo.wolfenet.com/jhardin PGP key ID: 0x41EA94F5
PGP key fingerprint: A3 0C 5B C2 EF 0D 2C E5 E9 BF C8 33 A7 A9 CE 76
-----------------------------------------------------------------------
Efficiency can magnify good, but it magnifies evil just as well.
So, we should not be surprised to find that modern electronic
communication magnifies stupidity as *efficiently* as it magnifies
intelligence.
-- Robert A. Matern
-----------------------------------------------------------------------
38 days until 9/9/99