[Cryptech Tech] DRBG for the RNG?
Василий Долматов
dol at reedcat.net
Tue Feb 25 10:13:03 UTC 2014
25 февр. 2014 г., в 13:43, Joachim Strömbergson <joachim at secworks.se> написал(а):
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Aloha!
>
> Basil Dolmatov wrote:
>>> Dol@, what is your view on suitable DRBG for the RNG. AES-256 in
>>> CTR mode only or something else? What would you use.
>> I would use true random source (noise) and feed the recurrent
>> polynomial with it, ;) Technology which takes not truly random source
>> and uses block ciphers for "equalizing" the entropy opens a great
>> field for investigation of its (block cipher) properties and possible
>> usage of possible linearities,
>
> Yes, we will be using true random entropy source(s). What I asked was
> what you would use as the DRBG part of the design.
>> and feed the recurrent
>> polynomial with it, ;)
> Or are you advocating
> the use of the collected entropy as the final output from the TRNG?
No, insufficient volume.
%(
dol@
>
> - --
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4815 bytes
Desc: not available
URL: <http://cryptech.is/pipermail/tech/attachments/20140225/6627a1f9/attachment.bin>
More information about the Tech
mailing list