[Cryptech Tech] RAM as source of entropy

Василий Долматов dol at reedcat.net
Thu Feb 6 14:07:08 UTC 2014


06 февр. 2014 г., в 17:50, Leif Johansson <leifj at sunet.se> написал(а):

> On 2014-02-06 14:43, Василий Долматов wrote:
>> 06 февр. 2014 г., в 16:47, Joachim Strömbergson <joachim at secworks.se> написал(а):
>> 
>>> -----BEGIN PGP SIGNED MESSAGE-----
>>> Hash: SHA256
>>> 
>>> Aloha!
>>> 
>>> I just had a (not very unique) idea of using RAM memories as source of
>>> entropy. The idea is to power cycle an external memory and read the
>>> contents. Due to how memories work the contents will be in more or less
>>> random state.
>> «Less» than «more». Unusable as a source.
> 
> can you elaborate? 
No. 


dol@


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cryptech.is/pipermail/tech/attachments/20140206/b32ba3a0/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4815 bytes
Desc: not available
URL: <http://cryptech.is/pipermail/tech/attachments/20140206/b32ba3a0/attachment.bin>


More information about the Tech mailing list