Date: Tue, 06 Jun 2000 16:21:26 -0400 From: "Jeroen C. van Gelderen" <jeroen@vangelderen.org> To: Dan Moschuk <dan@FreeBSD.org> Cc: Mark Murray <mark@grondar.za>, arch@FreeBSD.org, phk@FreeBSD.org Subject: Re: (2nd iteration) New /dev/(random|null|zero) - review, please Message-ID: <393D5D46.6BCACDE4@vangelderen.org> References: <200006051720.TAA18713@gratis.grondar.za> <393BEE84.BBAD3E82@vangelderen.org> <20000606160118.C3351@spirit.jaded.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Dan Moschuk wrote: > | > o The RNG is slow; the others are much faster than their originals. > | > | Can be tweaked. Use a 256-bit cipher like Rijndael and build a hash > | out of it. Would improve security too as the entropy pool would hold > | 256 bits. You can also pre-generate a few KB of random bits. > > Because of the significant speed decrease in using Yarrow, I'd like to see > us keep the current implementation around, and having Yarrow as an > option or psuedo-device to be used instead. Yarrow -when finished- is not noticably slower than our current implementation of /dev/[u]random. Yarrow does one block encryption for every output block and a generator gate every 10 blocks. This would allow for at least 40 mbit/s output on a 200 Mhz PPro when using Rijndael/256/256. Cheers, Jeroen -- Jeroen C. van Gelderen o _ _ _ jeroen@vangelderen.org _o /\_ _ \\o (_)\__/o (_) _< \_ _>(_) (_)/<_ \_| \ _|/' \/ (_)>(_) (_) (_) (_) (_)' _\o_ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-arch" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?393D5D46.6BCACDE4>