randomness // how important is it 'really', if it's not *absolutely* random ?

vedaal at hush.com vedaal at hush.com
Wed Jan 28 21:10:54 CET 2009


if the randomness collected for generation of a gnupg session key, 
isn't *absolutely* random, then it may introduce a bias whereby the 
session key space can be theoretically be able to be attacked by a 
'better-than-brute-force' method, by selectively concentrating on 
the possibilities the bias in in favor of

ok

how much of a threat is this really,
given the nature of how gnupg collects random data on the various 
computer platforms?

is there any practical way of exploiting this 'less-than-absolute' 
randomness, so that the attack is even approaching the threat level
of anything a crypto user needs to be concerned with?


to put it in quantitative terms,

can the 'pseudo-randomness' affect a 256 bit session key,
so that it would effectively be easier to attack than a 'truly-
random' 128 bit key?

if not,
then it shouldn't be a practical concern


is there any test of a computer system that can be done to know 
when the level of 'pseudo-randomness' has decreased to where it 
should be of practical concern ?

tia,

vedaal

any ads or links below this message are added by hushmail without 
my endorsement or awareness of the nature of the link

--
Never be in the dark again. Click now for a new generator!
 http://tagline.hushmail.com/fc/PnY6qxsz5e1NtuH5v6j1pZZg64Dd5ytllyp4QuhTXZe4BigcQK8Np/




More information about the Gnupg-users mailing list