In this situation would a third party with a copy of the audio environment (say through bugging) be able to use that against the crypto?

Henrique de Moraes Holschuh wrote:
On Thu, 13 Mar 2003, sean finney wrote:

 2. is there a way to inject bytes into the entropy pool of the
    linux kernel?


If you're going to do it by sampling the noise in an audio card, you better
analyze the output to check if it is indeed crypto-strong randomness.  Your
sampling module might need to do some math work before giving those bits to
the entropy pool.

And do _not_ overestimate the randomness of your noise. That will weaken
your random generator a lot.



--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Reply via email to