1200+ entries in 0.522s
a111: Logged on 2016-04-13 09:03 punkman:
https://eprint.iacr.org/2016/367 "we demonstrate various weaknesses of the random number generator (
RNG) in the OpenSSL cryptographic library"
BingoBoingo: ;;later tell shinohai pls to write up lottery
rng shennaniganz
mircea_popescu: asciilifeform so your resistence is chiefly based on, "nsa is incompetent, never got an actual intellect behind the effort to fuck up my miserable
rng source"
mircea_popescu: so i have to leave pc overnight /
rng on for ten minutes to make a key ? big whoop, i make a key a year if that, and i'm an intensive user.
phf: it is also filled with the kind of things that will give asciilifeform a severe twitch: guy takes hardware
rng, runs it on raspberry pi gpio, whiteness the result, and then xors in /dev/urandom. you know, for the kids!
mircea_popescu: your bias-less
rng shits out n/2 ones. they go against a message containing 3/4n ones. they will flip n/2 items in the message, 3/4 of which being 1s and 1/4 being 0s. you thus end up with 3/8 old ones + 1/8 ex-zeroes for a grand total of exactly 1/2 whoa.
☟︎ mircea_popescu: han byte n-1. The larger of the two indicates the message encrypted ; the difference between these counts indicate your confidence (or the
rng's bias).
mircea_popescu: you pick one of two lengthy, structured plaintexts i provide, you encrypt them with a biasless, purely random
rng, and i decide which of the two you picked.
danielpbarron: it probably suffers from the same problem as catan : bad
rng mircea_popescu: "This is interesting because nowhere do they address the central engineering issue -- that a fixed p,q is not secure yet a variable one requires another
RNG to seed the
RNG." << except the part where a prng IS NOT A
RNG ascii_butugychag: 'pushes the problem down to your
rng' which 'of course' can never work
mircea_popescu: whoever sits closer to the
rng in the sky prints all the money.
ben_vulpes: should i come up with my own hairbrained scheme to do so or ask how best to get entropy out of this
rng directly from you?
BingoBoingo: Because maybe his brain rot was likely to make him spill the wrong history of the
RNG ascii_field: btw i had a fella ask me about
rng at a job interview thing
ascii_field: and the conversation, from first packet onwards, must be indistinguishable from
rng garbage to the enemy.
mircea_popescu: whereas if done on camera, much less
rng, much less variation
ascii_field: there are 3 separate
rng subsystems in gpg 1.4 - but more on this later)
assbot: Logged on 31-10-2015 21:45:55; mircea_popescu: re asciilifeform mpi : the actual extraction, and especially auditing of the
rng is a very worthy project.
mircea_popescu: re asciilifeform mpi : the actual extraction, and especially auditing of the
rng is a very worthy project.
☟︎ mircea_popescu: this sort of thing is what i MEAN when i say "understand
rng".
ascii_field:
rng is merely ~one~ way to perform the function that it is for
mircea_popescu:
rng is imo least understood part of the box. a sort of equivalent of magnetism in physics.
ascii_field: (re: how
rng-ness is not a mathematical property of the bits, etc.)
assbot: Logged on 25-11-2013 03:41:29; asciilifeform: the essential, non-negotiable property of an
rng suitable for crypto is that its output must not be readily available to the enemy.
assbot: Logged on 29-10-2015 09:30:04; mircea_popescu: A LOT more research is needed before the cult will be happy with the cult's own understanding of what
RNG even fucking means (ie, stands for) in a computing environment.
mircea_popescu: anyway, all this aside : digging out the whole
rng story is a huge hot core of useful, important inquiry.
mircea_popescu: (also, the
RNG content of a computer is not strictly found in a box labeled such).
davout: the
RNG in the computer?
davout: i'm not saying that being a calculator should be the alpha and omega of computing, just that for crypto purposes it's probably better to not think of a
RNG as something acceptable
mircea_popescu: A LOT more research is needed before the cult will be happy with the cult's own understanding of what
RNG even fucking means (ie, stands for) in a computing environment.
☟︎ assbot: Logged on 18-09-2015 20:57:58; mircea_popescu: any program which allows for the attacker to read in any sense the
rng is not necessarily owning the box, but necessarily not part of the not-owning-the-box set either
ascii_field: Algorithm 4, we can unmask the 4-byte values returned in a status VSC response to reveal ”raw”
RNG bytes from the hardware side. Since this is done pre-authentication, any attacker can generate this from any locked drive.'
ascii_field: 'Another, even better, way that can be executed pre-authentication was found later. In fact, when looking deeper into the firmware code we noticed every time the status VSC is called, the raw
RNG bytes are masked with a static value. This static 4-byte value, 0x271828af, is xored with the 4-byte
RNG output. Further this value is xored with the last 4-byte SY N value before sending the value to the host computer. Using the
ascii_field: hint that the
RNG of the JMS583S is not cryptographically safe, showing clear patterns in Figure 4.'
mircea_popescu: "The Monte-Carlo approach to engineering, if you will, but with humans doing a really bad job of playing
RNG." << how mp's view of VC world sounds, without any of the bile.
mircea_popescu: ascii_field *I* am to find machine with hardware
rng ?
ascii_field: now mircea_popescu, find a fast machine with hardware
rng and run n = 21474837. then, shoot it into pgp.mit.edu ...
ascii_field: (goes without saying, don't run on a box where pgp is used for anything else. it will strain your
rng to all hell)
ascii_field: aha, let's Run Moar Ecc! in real time! with average pc
rng !
mircea_popescu: so "
rng boilerplate" MAY be a usable solution, but MUST NOT be dependend on going forward.
ascii_field: what i was trying to say is that if your
rng bits are not independent of one another, you don't have an
rng.
mircea_popescu: any program which allows for the attacker to read in any sense the
rng is not necessarily owning the box, but necessarily not part of the not-owning-the-box set either
☟︎ ascii_field: obviously if you use the ~same~
rng bits to generate key as you also made available to someone else, then you're dead
mircea_popescu: basic systems security is "attacker should not be able to read the machien
rng".
ascii_field: if your
rng key bits 'are key bits' you're sunk
mircea_popescu: however,
rng is no good because now you leak
rng bits, which ARE key bits.
punkman: phf: and in 2006 it had that nice
rng bug
ascii_field: that if hugh everett were alive today, he might build a machine that tests
rng output for being the privkey to a fat btc balance, and shoots him in the head if it fails
mircea_popescu: ascii_field "natura" in there is "the immediately observable", not the subatomic. there's a reason cardano
rng uses electrons not whores moaning.
mircea_popescu: asciilifeform you lose, i got your own damned
rng chips here.
mircea_popescu: asciilifeform just an exotic way to
rng, is in the end what he was trying to build
assbot: Logged on 01-08-2015 21:15:24; Apocalyptic: asciilifeform, I avoids to have access to an
rng at any further point