[39450] in bugtraq

home help back first fref pref prev next nref lref last post

Re: /dev/random is probably not

daemon@ATHENA.MIT.EDU (Thomas)
Wed Jul 6 14:23:11 2005

From: Thomas <tom@electric-sheep.org>
Reply-To: tom@electric-sheep.org
To: bugtraq@securityfocus.com
Date: Wed, 6 Jul 2005 07:51:44 +0200
Cc: "Robert Foxworth" <rfoxwor1@tampabay.rr.com>
In-Reply-To: <102101c5810d$83fbea90$0f49490a@fifteen>
MIME-Version: 1.0
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: <200507060751.45185.tom@electric-sheep.org>

> At the last place at which I worked, a few years ago, a "random
> number" was generated, and used in a FIPS 140-1 compliant
> encryption device, by capturing 128 ethernet frames in sequence
> from the local in-house network, gathering the LSB from the
> arrival time of each frame, and using those values to generate
> an encryption key. This was part of the "activation sequence"
> which had to be done, once, on each such device.
>
> Any studies out there on the randomness of such a number?
> At first glance a non-deterministic network would seem to be
> able to generate a useful number for the key.

It doesn't look like a good source of entropy. At least it wouldn't
withstand an active attack during this activation phase.


> - Bob Foxworth, GSEC, CISSP

Thomas Biege

-- 
Tom <tom@electric-sheep.org>
fingerprint = F055 43E5 1F3C 4F4F 9182  CD59 DBC6 111A 8516 8DBF

home help back first fref pref prev next nref lref last post