Re: [cryptography] random number generator

2014-11-22 Thread James A. Donald
On 2014-11-23 09:47, Russell Leidich wrote: "in your case, hash 128+N samples to get, say, 127.99 bits of entropy per hash output. N is small, under 20 I think." Yeah this certainly inspiring with respect to milking decent entropy from coldbootish environments. If we assume the use of a "good" h

Re: [cryptography] random number generator

2014-11-22 Thread Russell Leidich
"in your case, hash 128+N samples to get, say, 127.99 bits of entropy per hash output. N is small, under 20 I think." Yeah this certainly inspiring with respect to milking decent entropy from coldbootish environments. If we assume the use of a "good" hash, then the problem reduces to one of asking

Re: [cryptography] random number generator

2014-11-22 Thread Sandy Harris
On Sat, Nov 22, 2014 at 11:58 PM, Russell Leidich wrote: > 1. Let's do the math. Let's assume that we have a really dumb entropy > extractor ... that the timing of each > interrupt arrives predictably, but for an error of 1 CPU clock tick, at > random. ... 128 interrupts gives us 128 bits of entr

Re: [cryptography] random number generator

2014-11-22 Thread Kevin
On 11/22/2014 4:08 AM, James A. Donald wrote: On 2014-11-22 03:01, d...@deadhat.com wrote: Rather than me listing "names", why not just let it rip and run your own randomness tests on it? Because that won't tell me if you are performing entropy extraction. Jytter assumes an x86 machine wit

Re: [cryptography] random number generator

2014-11-22 Thread Russell Leidich
All, in the interest of clarity: 1. Let's do the math. Let's assume that we have a really dumb entropy extractor which waits around for 128 interrupts to occur. It just sits in a loop sampling the timestamp until this criterion is satisfied. It saves all these time stamps to a big chunk of memory.

Re: [cryptography] random number generator

2014-11-22 Thread stef
On Sat, Nov 22, 2014 at 08:13:31PM +1000, James A. Donald wrote: > The question is, does all this entropy show up in Jytter? I rather think it > does. the question is: is your adversary nature, or human nature? -- otr fp: https://www.ctrlc.hu/~stef/otr.txt __

Re: [cryptography] random number generator

2014-11-22 Thread James A. Donald
On 2014-11-22 06:31, d...@deadhat.com wrote: OK, if you think my Jytter TRNG is weak, I did not say it was weak. I said Jytter (and any other algorithm) is deterministic when run on an entropy free platform. This is a simple fact. All platforms have entropy. If they boot from a physical disk

Re: [cryptography] random number generator

2014-11-22 Thread James A. Donald
On 2014-11-22 03:01, d...@deadhat.com wrote: Rather than me listing "names", why not just let it rip and run your own randomness tests on it? Because that won't tell me if you are performing entropy extraction. Jytter assumes an x86 machine with multiple asynchronous clocks and nondeterminis

Re: [cryptography] random number generator

2014-11-21 Thread Dave Horsfall
On Fri, 21 Nov 2014, d...@deadhat.com wrote: > > OK, if you think my Jytter TRNG is weak, > > I did not say it was weak. I said Jytter (and any other algorithm) is > deterministic when run on an entropy free platform. This is a simple > fact. > > By all meas design new and interesting ways to

Re: [cryptography] random number generator

2014-11-21 Thread David Leon Gil
There's an implementation of Fortuna, which is a computationally secure PRNG, in PyCrypto: https://github.com/dlitz/pycrypto/tree/master/lib/Crypto/Random/Fortuna Unfortunately, gathering entropy is rather non-generic; otherwise decentish operating systems get this wrong. The various BSDs' source

Re: [cryptography] random number generator

2014-11-21 Thread Russell Leidich
For the record, I agree with both of those paragraphs. If I gave the impression somewhere that running Jytter in the absence of physical platform entropy would still make a good TRNG, then I was definitely off my rocker at the time. On Fri, Nov 21, 2014 at 8:31 PM, wrote: > > OK, if you think my

Re: [cryptography] random number generator

2014-11-21 Thread dj
> OK, if you think my Jytter TRNG is weak, I did not say it was weak. I said Jytter (and any other algorithm) is deterministic when run on an entropy free platform. This is a simple fact. By all meas design new and interesting ways to extract platform entropy, but condition your claims on that en

Re: [cryptography] random number generator

2014-11-21 Thread Russell Leidich
OK, if you think my Jytter TRNG is weak, then maybe you're right. Here is how someone can straightforwardly attempt to break it: do a WRMSR instruction to set the timestamp counter to some constant value immediately before running it. (Or, close enough, save the TSC value on entry to the function,

Re: [cryptography] random number generator

2014-11-21 Thread dj
> Rather than me listing "names", why not just let it rip and run your own > randomness tests on it? Because that won't tell me if you are performing entropy extraction. Jytter assumes an x86 machine with multiple asynchronous clocks and nondeterministic physical devices. This is not a safe assu

Re: [cryptography] random number generator

2014-11-20 Thread Stuart Christmas
Well I don't want to name drop on the basis that no-one will really care, and if anyone does, I don't want to risk them getting spammed. You can google it. For what it's worth, I have no vested interest in Jytter, I don't stand to make any money from it (it's open source duh), or fame as I had noth

Re: [cryptography] random number generator

2014-11-20 Thread Dave Horsfall
On Fri, 21 Nov 2014, Stu wrote: > Jytter does all of this and has been validated and proven by the worlds > leading random number experts. Its been validated as a TRNG (not a PRNG) > that operates in userspace. And its only 11 assembly language > instructions. And just who would these experts

Re: [cryptography] random number generator

2014-11-20 Thread Stu
Jytter does all of this and has been validated and proven by the worlds leading random number experts. Its been validated as a TRNG (not a PRNG) that operates in userspace. And its only 11 assembly language instructions. Sent from my iPhone > On 21 Nov, 2014, at 1:41, d...@deadhat.com wrote: >

Re: [cryptography] random number generator

2014-11-20 Thread dj
>>> Plz excuse if inappropriate. Does anyone know of a decent (as in >>> really >>> random) open source random generator? Preferably in PHP or C/C++? >>> >>> Thanks. Getting back to the initial question, the answer I think is 'no'. You haven't expressed clearly what you want from this RNG, but

Re: [cryptography] random number generator

2014-11-20 Thread Jean-Philippe Aumasson
ISAAC shouldn't be used as a crypto PRNG On Thursday, November 20, 2014, Ryan Carboni wrote: > http://burtleburtle.net/bob/rand/isaac.html Isaac works. > > On Wed, Nov 19, 2014 at 3:54 AM, Givon Zirkind > wrote: > >> Plz excuse if inappropriate. Does anyone know of a decent (as in really >> r

Re: [cryptography] random number generator

2014-11-20 Thread Ryan Carboni
http://burtleburtle.net/bob/rand/isaac.html Isaac works. On Wed, Nov 19, 2014 at 3:54 AM, Givon Zirkind wrote: > Plz excuse if inappropriate. Does anyone know of a decent (as in really > random) open source random generator? Preferably in PHP or C/C++? > > Thanks. > ___

Re: [cryptography] random number generator

2014-11-19 Thread Stu
Check out Jytter http://jytter.blogspot.sg/?m=1 Sent from my iPhone > On 19 Nov, 2014, at 19:54, Givon Zirkind wrote: > > Plz excuse if inappropriate. Does anyone know of a decent (as in really > random) open source random generator? Preferably in PHP or C/C++? > > Thanks. > __

Re: [cryptography] random number generator

2014-11-19 Thread Givon Zirkind
Plz excuse if inappropriate. Does anyone know of a decent (as in really random) open source random generator? Preferably in PHP or C/C++? Thanks. ___ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cry