[Cryptech Tech] DRBG for the RNG?

Василий Долматов dol at reedcat.net
Tue Feb 25 10:13:03 UTC 2014


25 февр. 2014 г., в 13:43, Joachim Strömbergson <joachim at secworks.se> написал(а):

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> 
> Aloha!
> 
> Basil Dolmatov wrote:
>>> Dol@, what is your view on suitable DRBG for the RNG. AES-256 in
>>> CTR mode only or something else? What would you use.
>> I would use true random source (noise) and feed the recurrent
>> polynomial with it, ;) Technology which takes not truly random source
>> and uses block ciphers for "equalizing" the entropy opens a great
>> field for investigation of its (block cipher) properties and possible
>> usage of possible linearities,
> 
> Yes, we will be using true random entropy source(s). What I asked was
> what you would use as the DRBG part of the design.

>> and feed the recurrent
>> polynomial with it, ;) 


> Or are you advocating
> the use of the collected entropy as the final output from the TRNG?
No, insufficient volume.
 %(

dol@

> 
> - -- 

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4815 bytes
Desc: not available
URL: <http://cryptech.is/pipermail/tech/attachments/20140225/6627a1f9/attachment.bin>


More information about the Tech mailing list