On 13 June 2014 06:27, Gunnar Wolf <gw...@gwolf.org> wrote:

>
> Excuse me if I'm blunt here, but I understand that, on the point of
> using entropy to seed a PRNG, if you have several shitty entropy
> sources and one _really_ good one, and you xor them all together, the
> resulting output is as random as the best of them. If your hardware
> entropy source is faulted and produces just an endless stream of
> '001001001001001001', xoring it with a valid Golomb sequence will give
> you something even more random than a Golomb sequence.
>
> Or am I misunderstanding my crypto?
>
>

The proof that XORing streams can't reduce the entropy relies on the
sources being independant. I think the issue here is we don't know if
RDRAND is independent or not. That said, doing a SHA256 over the output
should be sufficient (assuming the CPU doesn't see you're doing a hash and
short circuits it).

Have a nice day,
-- 
Martijn van Oosterhout <klep...@gmail.com> http://svana.org/kleptog/

Reply via email to