[cryptography] Mobile Devices and Location Information as Entropy?

Randall Webmail rvh40 at insightbb.com
Sat Apr 2 23:36:41 EDT 2011

----- Original Message -----
From: "Kevin W. Wall" <kevin.w.wall at gmail.com>

> > It is in my opinion a mistake to try to infer from a lightly
> > entropic source where the entropy is. Take *everything* that you
> > think might useful and run it through a hash function. Thinking
> > that the entropy is in the low bits is a mistake. Hash functions
> > exist for a purpose. Use them.
> Of course, if the GPS is tracking the random walk of a drunken
> sailor, you might be OK in terms of your entropy. (Sounds like
> an experiment is in order. ;-)

First, join the Navy ...

More information about the cryptography mailing list