1100+ entries in 0.62s
mircea_popescu: ;;later tell bingoboingo "Following the news of a serious
RNG bug affecting all GPG versions a low energy shitgnome campaign of apologetics and "not that bad" followed." << can i get a "The fact that hundreds of GPG keys have been Phuctored in the past year has, of course, nothing to do with all this." added ?
mircea_popescu: asciilifeform same people who check the gpg
rng unwhitened.
mircea_popescu: and hashes the result. this is the "
rng". at end of day publishes day's salt concatenations for each played hand.
mircea_popescu: if we actually go with a 12-pass hashing method, this then will require > 8kb of entropy/second from the client, which isn't possibru without dedicated
rng fountain.
mircea_popescu: in this case : here is the security loss from adding a 13th step to the 12 step scheme : 79. here is the security loss from not adding it, because
rng starvation : 45.
shinohai: has anyone checked the
rng for the new blockchain.info `wallet`
mircea_popescu: but anyway, it's ok that there isn't : there ALSO isn't a way to evaluate strength loss due to "
rng" starvation.
a111: Logged on 2016-08-05 00:40 mircea_popescu: "Testing RSA keys after generation is a fool's quest. This is a nice thing to do to detect some poor implementations, not poor keys. Moreover, it detects only certain classes of poor keys (specifically, those with small factors). It does not detect poorly seeded
RNG used in an otherwise correct RSA private key generation." << god i love reading year-old webwisdom/community consensusi.
mircea_popescu: "Testing RSA keys after generation is a fool's quest. This is a nice thing to do to detect some poor implementations, not poor keys. Moreover, it detects only certain classes of poor keys (specifically, those with small factors). It does not detect poorly seeded
RNG used in an otherwise correct RSA private key generation." << god i love reading year-old webwisdom/community consensusi.
☟︎ mircea_popescu: asciilifeform incidentally, "owned by whitening" is not altogether a bad theory wrt the null-entropy keys. ie, "they replaced
rng with null-outputting one, never noticed because whitening". this, of course, doesn't explain why gpg would end up with null-generated keys, but whatevs.
mircea_popescu: anywya, i don't dispute that "accidentally"-deliberately nobody put any effort into
rng quality assurance ; key quality assurance ; etc.
nosuchlabswww: Phuctor Finds Seven Keys Produced With Null
RNG, And Other Curiosities
mircea_popescu: they support anything and everything but sound cryptography, proper
rng etc.
mircea_popescu: anyway, it's not a matter of how to make green a prime number. it's more of a matter of "how to make cryptographic
rng work from a seed".
a111: Logged on 2016-06-27 17:15 asciilifeform: the historic ~0.1% popping rate of ssh keys has nothing to do with flips, and everything to do with embedded gadgets with no
rng a111: Logged on 2016-06-16 15:41 asciilifeform: this incidentally is why phuctor had been a depressing thing for me. the thing i set out to find, i never found (evidence of diddled
rng on pgp users' boxes.)
mircea_popescu: in general, a
rng capable of delivering good quality data by the tb is not free.
mircea_popescu: provided the
rng is that good, which probably it is not etc.
a111: Logged on 2016-02-06 20:47 mircea_popescu: your bias-less
rng shits out n/2 ones. they go against a message containing 3/4n ones. they will flip n/2 items in the message, 3/4 of which being 1s and 1/4 being 0s. you thus end up with 3/8 old ones + 1/8 ex-zeroes for a grand total of exactly 1/2 whoa.
a111: Logged on 2016-05-06 04:00 mircea_popescu: search me how the fuck they managed to get
rng in js, but w/e.
mircea_popescu: search me how the fuck they managed to get
rng in js, but w/e.
☟︎ a111: Logged on 2016-05-01 14:50 mircea_popescu: asciilifeform> (does everybody understand why scintillator ~fiber~ is neat, while the commonly-available scintillating plastic blocks are nearly useless for
rng ?) << essentially, quantum antenna.
mircea_popescu: asciilifeform> (does everybody understand why scintillator ~fiber~ is neat, while the commonly-available scintillating plastic blocks are nearly useless for
rng ?) << essentially, quantum antenna.
☟︎ phf:
rng posted for comedic value, thing reads like clever parody, while it of course is not
mircea_popescu: [which ties neatly into
rng discussion yest and structured-behaviour-and-the-wot perennially]
mircea_popescu: sure, an argument could be brought that "hey, even blocking /random is faster than dice". maybe. then consider machines that do not have a
rng at all, such as pogo. maybe they want pws too. etc.
phf: a dice
rng is "defective design". it's all over the place, low tech solution right in the middle of high tech stack. can't make one at home, since bias. wouldn't really make key by hand either. any optimizations turn to logical "why not flip electrons instead". i've noticed the tendency though, friend told me that he's generating work passwords with dicewear
a111: Logged on 2016-04-13 09:03 punkman:
https://eprint.iacr.org/2016/367 "we demonstrate various weaknesses of the random number generator (
RNG) in the OpenSSL cryptographic library"
mod6: <+asciilifeform> but it is NOT a substitute for modern electric
rng << hey, i guess to an extent, i totally agree. except, we don't have a modern electirc
rng.
mike_c: better for
RNG with dicelist