[cryptography] Intel RNG
James A. Donald
jamesd at echeque.com
Wed Jun 20 02:40:02 EDT 2012
On 2012-06-20 2:17 PM, David Johnston wrote:
> If an entropy source in a closed system is producing an apparently non
> repeating, unbiased sequence and its output is deterministic (or low
> entropy) then there must be internal memory in the entropy source that
> is enabling the non repeating behavior. The more memory, the longer you
> have to watch before you can identify repeating behavior.
> So make your entropy source have a very small amount of memory and be
> sufficiently simple that you can model it mathematically. Then you can
> show all the SPOF and DPOF failure modes and show that your health check
> circuitry catches them.
The whitener has a very large amount of memory.
So I would prefer the entropy source to be separate and separable from
the whitener, so that it could be checked by software, not hardware.
More information about the cryptography