[cryptography] Enranda: 4MB/s Userspace TRNG

Russell Leidich pkejjy at gmail.com
Tue May 26 22:27:39 EDT 2015

Hi Naveen,

Unfortunately, that page doesn't provide insights as to why that piece of
advice was issued.

And ultimately, even hardware TRNGs need to shuttle their outputs across
many radiating cables in order to arrive at their destination in memory,
even if we assume trusted components. So apart from the possibility of
software bugs (which could also plague USB, etc.) it's not clear to me why
the author has this opinion.

So why do you have this opinion?

Russell Leidich

On Wed, May 27, 2015 at 2:11 AM, Naveen Nathan <naveen at lastninja.net> wrote:

> Avoid: userspace random number generators, havaged, prngd, egd,
> /dev/random.
> Source: https://gist.github.com/tqbf/be58d2d39690c3b366ad
> Now that's advice I can get behind.
> On Tue, May 26, 2015 at 03:49:14PM -0700, coderman wrote:
> > On 5/26/15, Krisztián Pintér <pinterkr at gmail.com> wrote:
> > > i call bullshit on this one, just as i called bullshit on havege...
> >
> > dakarand is the other to add to this set, as well as the high
> > resolution timer based userspace rng daemon mods...
> >
> > best regards,
> > _______________________________________________
> > cryptography mailing list
> > cryptography at randombit.net
> _______________________________________________
> cryptography mailing list
> cryptography at randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.randombit.net/pipermail/cryptography/attachments/20150527/a3b6316b/attachment.html>

More information about the cryptography mailing list