867 entries in 0.56s
assbot: Logged on 22-03-2014 17:19:21; asciilifeform: incidentally, my first exposure to the problem of RNGs with inadequate
entropy was by accident, at uni
jurov: dat my mind. just produced a thought "what if we measure trilema
entropy? and what if it ends up being over-unity?"
mircea_popescu: chetty: does security exist in nature? << yes, actually.
entropy securely flows one way, and god help you if you mess with mass conservation.
mircea_popescu: kakobrekla not really, cause small kid tends to paw, and clustered keys is one of the main enemies of
entropy BingoBoingo: Seriously, burned rather than finish finding
entropy to generate keys
mircea_popescu: -192 and AES-256 revealing the final round key provides 128 bits of key
entropy.)
decimation: well, mircea's theory is that musical tastes randomly change with time &
entropy, the same is true for academic fashions
BingoBoingo: MolokoDeck: If you have a good source of
entropy for nonces, electrum has a nice CLI, this thing prolly ought to be connected to a private electrum server though if going for that over bitcoind
BingoBoingo: Seriously what does onename.io work with other tha grossly insufficient
entropy wallet
punkman: yeah you don't have to spend any processing cycles on what the other guy said, just do the most superficial patter-matching to harvest some
entropy for your markov chain
RebeccaBitcoin: However to what you were really asking, yes, i am satisfied with the response to my
entropy question
RebeccaBitcoin: ya thats why I wanted to ask you about the mouse
entropy thing
pete_dushenski: RebeccaBitcoin: not saying you have to use it, merely that it talks about the
entropy of javascript mouse clicks
assbot: Proof That Mycelium Knows How To Make A Better RNG For Its
Entropy Dongle. And Isn't. | Contravex: A blog by Pete Dushenski
RebeccaBitcoin: Before this conversation got out of hand, i was mainly referring to the ability of this site to generate a random wallet. I've read before that mouse
entropy is crap. While there are 2892383289 ^298289 possible private keys for Bitcoin, a wallet like this might be much more limited. As such, a system like this might only be capable of generating a
fluffypony: from an
entropy perspective it's a perfectly viable aspect
fluffypony: I don't think the mouse movey thing is any worse than the the way /dev/urandom collects
entropy from mouse movements / keyboard entry
ben_vulpes: RebeccaBitcoin: thou shalt not mix js and crypto, much less js and
entropy.
mircea_popescu: the major point of difference being that out of the glass, of water or of emotion, one can extract usable
entropy. not so from logic, at all.
benkay: <RebeccaBitcoin> is that unethical // brainwallets must have adequate
entropy, and no JS doth not provide.
kuzetsa: heat death of the universe resets everything to a state of
entropy, including politics
mircea_popescu: it's equalizing over time. hey asciilifeform ! i just got some
entropy!
BingoBoingo: do you read this thing like i do, ie, a nsa-sponsored attempt to survive the "everyone has cardano rng on board" apocalypse by making good
entropy sources still circumventable ? << I read either that or some kernel afficianado who would buy a unix pacemaker
mircea_popescu: sciilifeform do you read this thing like i do, ie, a nsa-sponsored attempt to survive the "everyone has cardano rng on board" apocalypse by making good
entropy sources still circumventable ?
mircea_popescu: Dropping out the egd support made me puzzled for a moment, but then I realized that there is no point in using egd to feed the randomness to the process, you just need to feed
entropy to the kernel, and let the process get it normally. I have had, unfortunately, quite a bit of experience with
entropy-generating daemons, and I wonder if this might be the right time to suggest getting a new multi-source daemon out." << a
mircea_popescu: no, the contrary. in the quest to make determinism infeasible, it requires some sort of
entropy reservoir outside-the-world.
mircea_popescu: one of the core (if unknown) principles underscoring all creation is that the qty of
entropy in a system remains the same if it's cut in half.
mircea_popescu: <decimation> any source of finite
entropy would eventually exhaust << this breaks physics.
decimation: any source of finite
entropy would eventually exhaust
mircea_popescu: what's this, a way to reduce key
entropy to breakable levels ?
assbot: Simtec Electronics
Entropy Key: USB True Random Number Generator
Vexual:
entropy is irrelevantr oto these soothsaysers
jurov: next time i see someone reading from bones or coffee stain imma pester them whether they have tested past output for enough
entropy Vexual: i dtill think a cell phne cam is an excellent source of
entropy decimation: "we have to accept that we can't give real
entropy to those that need it, so shut up and get on the bus
decimation: asciilifeform: re: linux on /dev/random "To me it sounds from your description that you may well be on the edge of "too anal". Real life _has_ to be taken into account, and not accepting
entropy because of theoretical issues is _not_ a good idea"
mircea_popescu: <decimation> mircea: the chance of a random integer from 1 to x being prime is about 1/ln(x) << you just use the
entropy to seed, much like pgp does. you don't actually roll the prime itself.
benkay: put a nice HD camera in there and you might capture...*some*
entropy.
mircea_popescu:
entropy and bias are not exactly orthogonal concerns, but they're still at an angle here
mthreat: Rassah et al: Would an accelerometer be a good source of
entropy? "shake to randomize"
benkay: mostly on the topic of getting
entropy out of sram imho
Rassah: benkay: a lot of tings said on the topic of that
Entropy device have been very retarded
Rassah: asciilifeform: I use "hash" interchangeably with "compute with one of the inputs for the formula being your source of
entropy, and the output being your private key
Rassah: Nikita: Total size 32 kBytes, we use about 21 kB as
entropy source.
Rassah: Me: You're basically saying that, even if they stole the device and examined it, or stole one that was made right after it with similar chip characteristics, they'd still have 8000 bits of
entropy to dea with, making their brutefocing impossible?
Rassah: So it's a good thing we're not relying on just SRAM fo the
entropy then
Rassah: asciilifeform: So, if I use an
entropy device to generate paper walets, you can bruteforce it by recording the temperature in my room???
Rassah: put it in the freezer in the kitchen and collected data while it was cooling down. There was still plenty at 0ºC, but it smoothly went down to zero
entropy around -20º. The cells with high skew are those which effectively constitute device signature.
Rassah: asciilifeform: From Nikita again: Most cells have too much skew to be useful. We suck
entropy out of those whose skew is low. That's why there is ~21:1 cell-to-
entropy ratio at room temperature on most devices. They had one device from Microchip IIRC, whose
entropy was much lower, but the others were very close to the 20–21 ballpark. We analysed data from MRD SoC, which is in the bitcoincard, and got the same 21:1 ratio. Then I
Rassah: Will Atmel know what your seed and other
entropy sources are? If not, why does it matter?
Rassah: We don't use hashing as a source of
entropy, no. Only to combine ours with a salt
Rassah: It may reduce
entropy, but it inreases he number of attack vectors, doesn't it? Attacker would need both the hardware based RNG and the salt to compromise it
Rassah: Initially the idea was: Write a salt onto the stick. Then generate key = H(H(entropy_1) + salt) + H(H(entropy_2) + salt), and print all of [key, salt, H(e1), H(H(e1) + salt), H(e2), H(H(e2) + salt)]. (+ could be arithmetic addition or XOR; either should be fine.) The user can then verify exactly one of the outer hashes on an insecure computer, and can verify the additions by hand (literally, pen and paper, no computer)
Rassah: key = H(salt||H(
entropy)) with H(
entropy) on a second sheet of paper so the user can verify it... or something
Rassah: Yes. If you plug tis device into your PC while holding down the button, it shows up in "flash mode", where instead of just a USB stick with a JPG on it, you get to see all the system and settings files. One of those files is a user provded sald (like diceware) that will be combined with the rest of the
entropy sources to produce the final key
Rassah: I mean the chip and the hardware has a lot of stuff in there. The
entropy is altready there, but initially we figured the SRAM chip was overkill. The "software adding
entropy" meaning we just add more code to grab
entropy from more hardware and user sources
Rassah: mircea_popescu: No, the hardware design is finished. Changes are only in software. Initial method of creating keys is done, we are just adding software patches to add more and more
entropy sources to this thing.
Rassah: Ah, got a eply. Seems we'll be using he Atmel provided SRAM after all. And "We will be doing our own analysis of data from several chips, and provide a raw
entropy file for those who want to do their own for their specific device." combined with "option to enter a user-supllied salt"
Rassah: compare it on the next run. Since we have about 30 times more
entropy Rassah: We can store part of the raw
entropy into non-volatile memory and
Rassah: In our tests, it still had plenty of
entropy at 0ºC, but it smoothly went down to zero
entropy around -20º. Maybe we should put warning stickers on these things saying "Caution - Chaotic System. Do not use in low
entropy environments above the Arctic or below the Antarctic circle, unless exposed to external sources of energy" :)
☟︎ Rassah: Basically an extremely high level
entropy generator that uses that
entropy to make secure paper walets
mircea_popescu: i guess asciilifeform is the guy who's done most re
entropy.
Rassah: Basically, we have people with reservations about the randomness and security of our
entropy devices, despite not actually knowing how it works, and we are hoping to get some of tose people to back up their claims
Rassah: Huh. He's actually the reason I'm in here in the first place. I followed his blog here, after he tweeted that Mycelium
Entropy < dice, and agreed once I asked him if he would be interested in auditing out device.
Rassah: We are raising money for
Entropy through Indiegogo because this was an idea that our devs came up with, and wanted to get it done regardless of our owner's financial input.
Rassah: For now the main product is the Android Wallet though. And that
Entropy thing we're finishing up
Rassah: specifically kickstarter projects,
Entropy, etc.
FabianB: asciilifeform: ah, ic, that discussion was already regarding
entropy assbot: Mycelium
Entropy | Indiegogo