[NCLUG] My attempts using /dev/random...
Chad Perrin
perrin at apotheon.com
Tue Apr 15 16:31:27 MDT 2008
On Tue, Apr 15, 2008 at 02:25:00AM -0600, James DeWitt wrote:
> On Monday 14 April 2008 8:47:33 pm Chad Perrin wrote:
> >
> > overview:
> >
> > http://en.wikipedia.org/wiki//dev/random#Linux
> >
> > In short, /dev/random and /dev/urandom use the same algorithm, except
> > that when /dev/urandom "runs out of entropy" bit it just starts over on
> > what it already has -- and when /dev/random runs out, it waits until it
> > gets more. What each of them uses to "generate entropy" is whatever
> > activity is going on at the time on the computer -- keystrokes, I/O
> > operations, et cetera. This is generally quite more than sufficient for
> > cryptographic purposes (which is about as stringent as requirements are
> > going to get in our everyday lives), but in some theoretical academic
> > sense a case could be made for a lot of the "entropy" generated in this
> > manner being pseudo-deterministic in a lot of cases. Unless the NSA has
> > some serious blue-sky prediction stuff going on that the only the most
> > paranoid of us might imagine, though, the effective difference between
> > system-generated "entropy" and what you could get from quantum events is
> > negligible.
>
> That is not quite what the source says. It makes a sharper distinction between
> the quality of the random numbers from /dev/random and /dev/urandom.
>
> "
> * The two other interfaces are two character devices /dev/random and
> * /dev/urandom. /dev/random is suitable for use when very high
> * quality randomness is desired (for example, for key generation or
> * one-time pads), as it will only return a maximum of the number of
> * bits of randomness (as estimated by the random number generator)
> * contained in the entropy pool.
> *
> * The /dev/urandom device does not have this limit, and will return
> * as many bytes as are requested. As more and more random bytes are
> * requested without giving time for the entropy pool to recharge,
> * this will result in random numbers that are merely cryptographically
> * strong. For many applications, however, this is acceptable.
> "
> Looking through the docs and code, I can't see how the system entropy
> pool could be considered just random seeds.
Tell me, then -- what *is* the system entropy pool, and how do you think
it differs functionally from random seeds?
--
CCD CopyWrite Chad Perrin [ http://ccd.apotheon.org ]
Anonymous: "Eat your crow early, while it's young and tender. Don't wait
until it's old and tough."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 195 bytes
Desc: not available
URL: <http://lists.nclug.org/pipermail/nclug/attachments/20080415/7ee1aa09/attachment.pgp>
More information about the NCLUG
mailing list