cvs commit: src/sys/modules/random Makefile src/sys/dev/random
harvest.c hash.c hash.h nehemiah.c nehemiah.h probe.c randomdev.c
randomdev.h randomdev_soft.c randomdev_soft.h yar
Mark Murray
mark at grondar.org
Sat Apr 10 15:10:32 PDT 2004
Sam Leffler writes:
> On Apr 10, 2004, at 1:54 AM, Mark Murray wrote:
> > If it is felt that further whitening of the VIA C3 RNG is needed,
> > then I believe that Yarrow would be overkill, and that a much
> > smaller hash function will be sufficient.
>
> Unless I misread the paper it seemed very clear in stating that you
> need to post-process the h/w RNG. I run all my h/w entropy sources
> through the rndtest module (FIPS-140 testing) and frequently see that
> h/w entropy sources are not to be trusted (note that rndtest samples
> the entropy and that the FIPS test suite is far less stringent than
> the testing done in the papers).
I'll look at putting a low-overhead entropy-pool-stirrer after the C3
RNG.
> I have not had time to review Marks changes but I agree with Nate
> that h/w entropy sources should not be trusted and some form of
> post-processing must be done. Whether this is Yarrow or something
> else is unclear but the papers cited did a thorough analysis while all
> I've seen from Mark are statements that he believes these sources are
> good. When it comes to stuff like this I believe strongly in taking a
> conservative approach.
Actually, the paper that Nate pointed at said that each bit of entropy
that the C3 RNG supplied delivered between 2/3 and nearly 1 bit of
"good" randomness. If the on-chip whitener was on, then "0.99 bits per
bit supplied" (my paraphrase) was given.
Still, opinion seems to be in favour of further postprocessing, so I'll
do it.
M
--
Mark Murray
iumop ap!sdn w,I idlaH
More information about the cvs-src
mailing list