From owner-cvs-all@FreeBSD.ORG Sat Apr 10 11:40:04 2004 Return-Path: Delivered-To: cvs-all@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 783BC16A4CE; Sat, 10 Apr 2004 11:40:04 -0700 (PDT) Received: from saturn.criticalmagic.com (saturn.criticalmagic.com [68.213.16.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id 2CCAE43D48; Sat, 10 Apr 2004 11:40:04 -0700 (PDT) (envelope-from richardcoleman@mindspring.com) Received: from mindspring.com (titan.criticalmagic.com [68.213.16.23]) by saturn.criticalmagic.com (Postfix) with ESMTP id 5771A3BD10; Sat, 10 Apr 2004 14:40:03 -0400 (EDT) Message-ID: <40783F8C.1010704@mindspring.com> Date: Sat, 10 Apr 2004 14:40:12 -0400 From: Richard Coleman Organization: Critical Magic, Inc. User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.6) Gecko/20040113 X-Accept-Language: en-us, en MIME-Version: 1.0 To: Mark Murray References: <200404100854.i3A8sa0w066414@grimreaper.grondar.org> In-Reply-To: <200404100854.i3A8sa0w066414@grimreaper.grondar.org> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit cc: Bruce M Simpson cc: src-committers@FreeBSD.ORG cc: Nate Lawson cc: cvs-all@FreeBSD.ORG cc: cvs-src@FreeBSD.ORG Subject: Re: cvs commit: src/sys/modules/random Makefile src/sys/dev/random randomdev.h randomdev_soft.c randomdev_soft.h yar X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list Reply-To: richardcoleman@mindspring.com List-Id: CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 10 Apr 2004 18:40:04 -0000 Mark Murray wrote: > Bruce M Simpson writes: > >>>>http://www.cryptography.com/resources/whitepapers/index.html >>> >>>Actually, I have. I read it again, now, to be sure. Nothing it says >>>suggests that what I did here is a "huge mistake". Nearest I get is >>>the suggestion that the output from the on-chip RNG is used as a >>>source for a hash function (like Yarrow). I feel that is overkill, >>>and that the output of the on-chip RNG is sufficient. >> >>I'm inclined to trust your judgement here on this, Mark, but Nate does >>have a valid point; we need to be sure that the entropy sources are of >>sufficiently high quality or we risk compromising the system. >> >>If you could cite some independent tests for the VIA C3 on-chip RNG >>that would be very helpful to all. > > > How about Nate's paper? It gives the VIA C3 a very high assessment WRT > the quality of the entropy delivered. > > If it is felt that further whitening of the VIA C3 RNG is needed, > then I believe that Yarrow would be overkill, and that a much smaller > hash function will be sufficient. > > M > -- > Mark Murray What do you have in mind? AES is already one of the faster ciphers around. You could reduce the number of rounds used for AES, but it would be hard to estimate the cryptographic strength. Richard Coleman richardcoleman@mindspring.com