[Cryptech Tech] Avalanche noise test boards
Bernd Paysan
bernd at net2o.de
Sat Aug 23 11:56:14 UTC 2014
Am Samstag, 23. August 2014, 11:37:33 schrieb Benedikt Stockebrand:
> Hi Peter and list,
>
> Peter Gutmann <pgut001 at cs.auckland.ac.nz> writes:
> > [FreeBSD /dev/{,u}random]
> >
> > Still, preprocessing with Yarrow gets my grunt of
> >
> > approval :=).
>
> what I'm somewhat disappointed about is that they still use Yarrow; it's
> been ten years ago or so that Schneier et al. proposed Fortuna as its
> successor, due to some rather nasty limitations of Yarrow.
Well, and the world moved since the last 10 years. Which is why I would use
Keccak as PRNG today:
http://sponge.noekeon.org/SpongePRNG.pdf
The point here is that if you have verified that your cryptographic primitive
works well as hash, you have done all the hard work, because hashes are really
difficult (you know input and output, there's no secret, and yet, you should
not be able to break them).
You can seed that whenever you want, with as much data as you want (just feed
in all the output of the noise sources), and fetch as much data as you want
without generating cycles (the cycle probabilitiy of Keccak in squeeze mode is
1/2^750).
--
Bernd Paysan
"If you want it done right, you have to do it yourself"
http://bernd-paysan.de/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
URL: <https://lists.cryptech.is/archives/tech/attachments/20140823/a879f0f5/attachment.sig>
More information about the Tech
mailing list