[Cryptech Tech] RAM as source of entropy
Василий Долматов
dol at reedcat.net
Thu Feb 6 14:07:08 UTC 2014
06 февр. 2014 г., в 17:50, Leif Johansson <leifj at sunet.se> написал(а):
> On 2014-02-06 14:43, Василий Долматов wrote:
>> 06 февр. 2014 г., в 16:47, Joachim Strömbergson <joachim at secworks.se> написал(а):
>>
>>> -----BEGIN PGP SIGNED MESSAGE-----
>>> Hash: SHA256
>>>
>>> Aloha!
>>>
>>> I just had a (not very unique) idea of using RAM memories as source of
>>> entropy. The idea is to power cycle an external memory and read the
>>> contents. Due to how memories work the contents will be in more or less
>>> random state.
>> «Less» than «more». Unusable as a source.
>
> can you elaborate?
No.
dol@
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cryptech.is/pipermail/tech/attachments/20140206/b32ba3a0/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4815 bytes
Desc: not available
URL: <http://cryptech.is/pipermail/tech/attachments/20140206/b32ba3a0/attachment.bin>
More information about the Tech
mailing list