excessive usage of /dev/random?

Robert J. Hansen rjh at sixdemonbag.org
Fri May 1 21:52:13 CEST 2015


> Drawing ~300 bytes from /dev/random to create a ~2048 bit keypair
> seems entirely reasonable.

I had a response to this that I thought was a neat digression into why
this may not be a reasonable assumption: by the end of it I realized I'd
just shown that ultimately it may be reasonable, too.  For that reason
I'm not sharing it, because ultimately it amounted to no contribution at
all.

But if anyone wants to see a high school math overview of large number
theory and what it tells us about asymmetric key generation and how to
break asymmetric keys, email me *OFF-LIST* and I'll share it.  :)

Remember: *OFF-LIST*.  Let's not clutter gnupg-devel.  :)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 3744 bytes
Desc: S/MIME Cryptographic Signature
URL: </pipermail/attachments/20150501/55214d0d/attachment-0001.bin>


More information about the Gnupg-devel mailing list