Hi Everyone, Just a quick public service announcement for DUHK attacks (https://duhkattack.com/).
The default random number generator for the library is AutoSeededRandomPool. It is a AES-based PGP-style generator that gets its seed from the OS's entropy pool. The pools are /dev/random, /dev/urandom or CryptGenRandom. The FIPS DLL used AutoSeededX917RNG<AES>, but the seed was taken from the OS pool rather than time. The pool sources are /dev/random, /dev/urandom or CryptGenRandom. You should be OK as long as you allowed the generator to seed itself with OS_GenerateRandomBlock. If you supplied a time-based seed then you could be in trouble. Also see the DefaultAutoSeededRNG class and AutoSeededX917RNG<BLOCK_CIPHER>::Reseed() in https://github.com/weidai11/cryptopp/blob/master/osrng.h; and https://www.cryptopp.com/wiki/RandomNumberGenerator on the wiki. Jeff -- -- You received this message because you are subscribed to the "Crypto++ Users" Google Group. To unsubscribe, send an email to [email protected]. More information about Crypto++ and this group is available at http://www.cryptopp.com. --- You received this message because you are subscribed to the Google Groups "Crypto++ Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
