Re: [dsfjdssdfsd] What has gone wrong with RNGs in practice

Dan Brown <dbrown@certicom.com> Mon, 17 March 2014 14:35 UTC

Return-Path: <dbrown@certicom.com>
X-Original-To: dsfjdssdfsd@ietfa.amsl.com
Delivered-To: dsfjdssdfsd@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AA7B1A017E for <dsfjdssdfsd@ietfa.amsl.com>; Mon, 17 Mar 2014 07:35:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0
X-Spam-Level:
X-Spam-Status: No, score=0 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, HTML_MESSAGE=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XJBd7iWtQ2Il for <dsfjdssdfsd@ietfa.amsl.com>; Mon, 17 Mar 2014 07:35:14 -0700 (PDT)
Received: from smtp-p02.blackberry.com (smtp-p02.blackberry.com [208.65.78.89]) by ietfa.amsl.com (Postfix) with ESMTP id E96CB1A0411 for <dsfjdssdfsd@ietf.org>; Mon, 17 Mar 2014 07:35:12 -0700 (PDT)
Received: from xct102cnc.rim.net ([10.65.161.202]) by mhs214cnc.rim.net with ESMTP/TLS/AES128-SHA; 17 Mar 2014 10:35:02 -0400
Received: from XCT113CNC.rim.net (10.65.161.213) by XCT102CNC.rim.net (10.65.161.202) with Microsoft SMTP Server (TLS) id 14.3.174.1; Mon, 17 Mar 2014 10:35:01 -0400
Received: from XMB116CNC.rim.net ([fe80::45d:f4fe:6277:5d1b]) by XCT113CNC.rim.net ([::1]) with mapi id 14.03.0174.001; Mon, 17 Mar 2014 10:35:01 -0400
From: Dan Brown <dbrown@certicom.com>
To: "dsfjdssdfsd@ietf.org" <dsfjdssdfsd@ietf.org>
Thread-Topic: Re: What has gone wrong with RNGs in practice
Thread-Index: Ac9B7dulrErbn6EYTHygX4piIDAnQQ==
Date: Mon, 17 Mar 2014 14:35:00 +0000
Message-ID: <810C31990B57ED40B2062BA10D43FBF5C5918A@XMB116CNC.rim.net>
Accept-Language: en-CA, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.65.160.252]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_0032_01CF41CC.8C978DB0"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/dsfjdssdfsd/ehXT1B8l0DHbva60dJan8EO6ycs
Subject: Re: [dsfjdssdfsd] What has gone wrong with RNGs in practice
X-BeenThere: dsfjdssdfsd@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The dsfjdssdfsd list provides a venue for discussion of randomness in IETF protocols, for example related to updating RFC 4086." <dsfjdssdfsd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dsfjdssdfsd>, <mailto:dsfjdssdfsd-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dsfjdssdfsd/>
List-Post: <mailto:dsfjdssdfsd@ietf.org>
List-Help: <mailto:dsfjdssdfsd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dsfjdssdfsd>, <mailto:dsfjdssdfsd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Mar 2014 14:35:16 -0000

> EE. Bad entropy estimation

> 

> Numerous RNGs rely on each entropy inputs being acccompanied by an

> estimate of how many bits of entropy each contains. Historically,

> these entropy estimates have been pretty bogus, but I'm not aware of

> any attack arising out of that.

 

Does the Goldberg-Wagner attack on the poorly seeded Netscape SSL RNG count
here?

 

 


Daniel Brown


Research In Motion Limited