1200+ entries in 0.733s

a111: Logged on 2016-04-13 09:03 punkman: 
https://eprint.iacr.org/2016/367 "we demonstrate various weaknesses of the random number generator (
RNG) in the OpenSSL cryptographic library"
  BingoBoingo: ;;later tell shinohai pls to write up lottery 
rng shennaniganz
 mircea_popescu: asciilifeform so your resistence is chiefly based on, "nsa is incompetent, never got an actual intellect behind the effort to fuck up my miserable 
rng source"
 mircea_popescu: so i have to leave pc overnight / 
rng on for ten minutes to make a key ? big whoop, i make a key a year if that, and i'm an intensive user.
 phf: it is also filled with the kind of things that will give asciilifeform a severe twitch: guy takes hardware 
rng, runs it on raspberry pi gpio, whiteness the result, and then xors in /dev/urandom. you know, for the kids!
 mircea_popescu: your bias-less 
rng shits out n/2 ones. they go against a message containing 3/4n ones. they will flip n/2 items in the message, 3/4 of which being 1s and 1/4 being 0s. you thus end up with 3/8 old ones + 1/8 ex-zeroes for a grand total of exactly 1/2 whoa.
 ☟︎ mircea_popescu: han byte n-1. The larger of the two indicates the message encrypted ; the difference between these counts indicate your confidence (or the 
rng's bias).
 mircea_popescu: you pick one of two lengthy, structured plaintexts i provide, you encrypt them with a biasless, purely random 
rng, and i decide which of the two you picked.
 danielpbarron: it probably suffers from the same problem as catan : bad 
rng mircea_popescu: "This is interesting because nowhere do they address the central engineering issue -- that a fixed p,q is not secure yet a variable one requires another 
RNG to seed the 
RNG." << except the part where a prng IS NOT A 
RNG ascii_butugychag: 'pushes the problem down to your 
rng' which 'of course' can never work
 mircea_popescu: whoever sits closer to the 
rng in the sky prints all the money.
 ben_vulpes: should i come up with my own hairbrained scheme to do so or ask how best to get entropy out of this 
rng directly from you?
 BingoBoingo: Because maybe his brain rot was likely to make him spill the wrong history of the 
RNG ascii_field: btw i had a fella ask me about 
rng at a job interview thing
 ascii_field: and the conversation, from first packet onwards, must be indistinguishable from 
rng garbage to the enemy.
 mircea_popescu: whereas if done on camera, much less 
rng, much less variation
 ascii_field: there are 3 separate 
rng subsystems in gpg 1.4 - but more on this later)
 assbot: Logged on 31-10-2015 21:45:55; mircea_popescu: re asciilifeform mpi : the actual extraction, and especially auditing of the 
rng is a very worthy project.
 mircea_popescu: re asciilifeform mpi : the actual extraction, and especially auditing of the 
rng is a very worthy project.
 ☟︎ mircea_popescu: this sort of thing is what i MEAN when i say "understand 
rng".
 ascii_field: 
rng is merely ~one~ way to perform the function that it is for
 mircea_popescu: 
rng is imo least understood part of the box. a sort of equivalent of magnetism in physics.
 ascii_field: (re: how 
rng-ness is not a mathematical property of the bits, etc.)
 assbot: Logged on 25-11-2013 03:41:29; asciilifeform: the essential, non-negotiable property of an 
rng suitable for crypto is that its output must not be readily available to the enemy.
 assbot: Logged on 29-10-2015 09:30:04; mircea_popescu: A LOT more research is needed before the cult will be happy with the cult's own understanding of what 
RNG even fucking means (ie, stands for) in a computing environment.
 mircea_popescu: anyway, all this aside : digging out the whole 
rng story is a huge hot core of useful, important inquiry.
 mircea_popescu: (also, the 
RNG content of a computer is not strictly found in a box labeled such).
 davout: the 
RNG in the computer?
 davout: i'm not saying that being a calculator should be the alpha and omega of computing, just that for crypto purposes it's probably better to not think of a 
RNG as something acceptable
 mircea_popescu: A LOT more research is needed before the cult will be happy with the cult's own understanding of what 
RNG even fucking means (ie, stands for) in a computing environment.
 ☟︎ assbot: Logged on 18-09-2015 20:57:58; mircea_popescu: any program which allows for the attacker to read in any sense the 
rng is not necessarily owning the box, but necessarily not part of the not-owning-the-box set either
 ascii_field: Algorithm 4, we can unmask the 4-byte values returned in a status VSC response to reveal ”raw” 
RNG bytes from the hardware side. Since this is done pre-authentication, any attacker can generate this from any locked drive.'
 ascii_field: 'Another, even better, way that can be executed pre-authentication was found later. In fact, when looking deeper into the firmware code we noticed every time the status VSC is called, the raw 
RNG bytes are masked with a static value. This static 4-byte value, 0x271828af, is xored with the 4-byte 
RNG output. Further this value is xored with the last 4-byte SY N value before sending the value to the host computer. Using the
 ascii_field: hint that the 
RNG of the JMS583S is not cryptographically safe, showing clear patterns in Figure 4.'
 mircea_popescu: "The Monte-Carlo approach to engineering, if you will, but with humans doing a really bad job of playing 
RNG." << how mp's view of VC world sounds, without any of the bile.
 mircea_popescu: ascii_field *I* am to find machine with hardware 
rng ?
 ascii_field: now mircea_popescu, find a fast machine with hardware 
rng and run n = 21474837. then, shoot it into pgp.mit.edu ...
 ascii_field: (goes without saying, don't run on a box where pgp is used for anything else. it will strain your 
rng to all hell)
 ascii_field: aha, let's Run Moar Ecc! in real time! with average pc 
rng !
 mircea_popescu: so "
rng boilerplate" MAY be a usable solution, but MUST NOT be dependend on going forward.
 ascii_field: what i was trying to say is that if your 
rng bits are not independent of one another, you don't have an 
rng.
 mircea_popescu: any program which allows for the attacker to read in any sense the 
rng is not necessarily owning the box, but necessarily not part of the not-owning-the-box set either
 ☟︎ ascii_field: obviously if you use the ~same~ 
rng bits to generate key as you also made available to someone else, then you're dead
 mircea_popescu: basic systems security is "attacker should not be able to read the machien 
rng".
 ascii_field: if your 
rng key bits 'are key bits' you're sunk
 mircea_popescu: however, 
rng is no good because now you leak 
rng bits, which ARE key bits.
 punkman: phf: and in 2006 it had that nice 
rng bug
 ascii_field: that if hugh everett were alive today, he might build a machine that tests 
rng output for being the privkey to a fat btc balance, and shoots him in the head if it fails
 mircea_popescu: ascii_field "natura" in there is "the immediately observable", not the subatomic. there's a reason cardano 
rng uses electrons not whores moaning.
 mircea_popescu: asciilifeform you lose, i got your own damned 
rng chips here.
 mircea_popescu: asciilifeform just an exotic way to 
rng, is in the end what he was trying to build
 assbot: Logged on 01-08-2015 21:15:24; Apocalyptic: asciilifeform, I avoids to have access to an 
rng at any further point