Am Freitag, 29. November 2013, 11:55:41 schrieb Stephan Mueller:

Hi,

>Am Freitag, 29. November 2013, 11:22:29 schrieb Joachim Strömbergson:
>
>Hi Joachim,
>
>> Very cool. How does [1] compare functionally to jytter?
>> http://jytter.blogspot.se/
>
>I very briefly checked, but it seems that the author's consideration
>takes interrupts and the like as the basis for the entropy. In
>addition, he assumes that the prediction of some events cannot be done
>with a good resolution. However, none of these considerations apply.

Sorry, I meant, "none of these considerations apply to my RNG"
>
>My RNG is:
>
>rdtsc
><some small code>
>rdtsc
>
>==> now you simply measure the execution time of the code. That time
>shows variances. And I just pick them up and magnify them.
>
>The key is that you always have these varations on all kinds of CPUs.
>And as mentioned before, I think the key reason is that the clock
>cycles of the CPU mismatch with the RAM / Cache clock cycles.
>
>Ciao
>Stephan


Ciao
Stephan
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to