Re: Fwd: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random

2013-10-14 Thread Stephan Mueller
Am Montag, 14. Oktober 2013, 16:12:24 schrieb Stephan Mueller: Hi Sandy, > >(PS: I am aware that in case none of the individual bits would contain >one full bit of entropy, the folding operation may --mathematically >spoken-- not deliver one full bit of entropy. However, after speaking >with a ma

Re: Fwd: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random

2013-10-14 Thread Stephan Mueller
Am Montag, 14. Oktober 2013, 09:38:34 schrieb Sandy Harris: Hi Sandy, >Stephan Mueller wrote: > >>>If what you are doing is not a parity computation, then you need a >>>better description so people like me do not misread it. >>> >> It is not a parity computation that the folding loop performs. T

Fwd: [PATCH] CPU Jitter RNG: inclusion into kernel crypto API and /dev/random

2013-10-14 Thread Sandy Harris
Stephan Mueller wrote: >>Paper has: >> >>" the time delta is partitioned into chunks of 1 bit starting at the >>lowest bit " The 64 1 bit chunks of the time value are XORed with >>each other to " form a 1 bit value. >> >>As I read that, you are just taking the parity. Why not use that >>simp