Date: Wed, 3 May 2000 13:06:04 -0500 (CDT) From: James Wyatt <jwyatt@rwsystems.net> To: Matthew Dillon <dillon@apollo.backplane.com> Cc: "Andrew J. Korty" <ajk@iu.edu>, security@FreeBSD.ORG Subject: Re: Cryptographic dump(8) Message-ID: <Pine.BSF.4.10.10005031304120.21115-100000@bsdie.rwsystems.net> In-Reply-To: <200005031718.KAA63329@apollo.backplane.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 3 May 2000, Matthew Dillon wrote: [ losts stuff deleted ] > Also, putting a random number in each block is important if each block > is separately encrypted, for the same reason. > > Using /dev/random to obtain your random numbers is considered to be > acceptable. How can you tell how much entropy is in the 'pool' for /dev/random and it's about to start being not-so-random? Pull a sample once in a while and Chi test it? I like being able to know. - Jy@ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.10005031304120.21115-100000>