Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Jul 2000 15:06:34 +0200
From:      Poul-Henning Kamp <phk@critter.freebsd.dk>
To:        Stefan `Sec` Zehl <sec@require-re.42.org>
Cc:        freebsd-current@FreeBSD.ORG
Subject:   Re: randomdev entropy gathering is really weak 
Message-ID:  <3661.964357594@critter.freebsd.dk>
In-Reply-To: Your message of "Sun, 23 Jul 2000 14:53:50 %2B0200." <200007231253.OAA28448@matrix.42.org> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <200007231253.OAA28448@matrix.42.org>, Stefan `Sec` Zehl writes:

>Assume I want to encrypt a message by XOR'ing with randomness.
>
>If I then exchange my keys securely, the message is uncrackable.
>
>With the current approach it has a 256bits key. This is, in my eyes, not
>good. Although yarrow is nice, It's suited for any kind of key
>generation.

The first law of crypto clearly states: "Know what you're doing".

There is no way around that law.

We cannot load down FreeBSD with impossibly heavy computations to
cater for any and all conceiveable application of random numbers.

In particular I fear that the current implementation already has
killed battery lifetimes on laptops :-(

--
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD coreteam member | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3661.964357594>