wk at isil.d.shuttle.de
Fri Feb 20 18:54:57 CET 1998
Anand Kumria <wildfire at progsoc.uts.edu.au> writes:
> Ian Miller <Ian_Miller at bifroest.demon.co.uk>
I wrote to him yesterday.
> Since it is under the GPL it should be possible to grab things they done
> nicely. Perhaps the PRNG? I've found G10's PRNG to be pretty slow (>60
> mins to generate a 2K key on my 486).
It's not a PRNG but a RNG. It uses the Linux /dev/random to get random
bytes. This device collects random from different sources: interrupts,
key hit, serial port activity (mouse) and estimates how much random is
available (/dev/urandom don't stop, but uses a PRNG based on the hash
functions). Theoretical it is good to do this in the kernel, but it is
With one of the last releases I increased the speed of key generation, by
using /dev/urandom for prime number generation because the prime is part
of the public key (and may even be shared among many users) and does not
need a strong random number (like rsa). The secret parameter is one
random integer which is of course generated from /dev/random; this device
does not deliver if there is no noise in your box - from my expierince it is
best to switch to another window and keep hacking on the keyboard (somewhat
like the old PGP).
I browsed through the CTC source, but they have only a dummy random
generator for now. It would be a could idea if someone could write this
RNG for G10, so I can swicth to version 0.3
> Perhaps CTC and G10 can be successfully merged? I was just thinking about
> pulling the hashing functions that G10 has into a library (say libhash).
I'll do a library (of fundamental cryptograhic function) sometime in the
future. Let's see what Ian says.
finger gcrypt at ftp.guug.de for G10 key
fingerprint = 8489 6CD0 1851 0E33 45DA CD67 036F 11B8 FF3E AA0B
More information about the Gnupg-devel