How does Windows GnuPG generate random numbers on keygen?

Ryan Malayter rmalayter@bai.org
Tue Feb 12 19:14:02 2002


The Windows CryptoAPI provides a pretty good system entropy pool, much like
/dev/rand does on Linux systems. You access this pool with the
CryptGenRandom API call, although I don't believe the Windows version of
GnuPG uses it.

On my  dual 1.53 GHz Athalon system, generating a 2048-bit key took about 15
seconds. The system experienced >40 billion clock cycles and >15,0000
interrupt requests in that time frame. Distilling 2048 bits of entropy from
this amount of timing data - combined with the pre-existing random seed pool
- certainly seems viable. 

Key generation in GnuPG actually seems pretty slow to me, especially on
newer Intel-based systems which have a hardware random number generator that
can be accessed through CryptoAPI. GnuPG just isn't using this device, I
guess.

	-ryan-

-----Original Message-----
From: Peter Constantinidis [mailto:peter@constantinidis.ca] 
Sent: Tuesday, February 12, 2002 10:57 AM
To: gnupg-users@gnupg.org
Subject: How does Windows GnuPG generate random numbers on keygen?


I was wondering this because back in '97 when I generated a PGP key using
the 'slow' method I had to move the mouse, tap keys, etc. to generate
entropy and then wait a while while it calculated a key.

In the options file it makes reference to unix random number generators but
doesn't mention how Windows operates..

Also keygen on GnuPG seems awfully fast.. granted I have an XP 1700 which is
a significant improvement from what I had in '97, but still shouldn't it
take longer than a few seconds to generate a 2048 key?

Best,
Peter.

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users