randomness // how important is it 'really', if it's not *absolutely* random ?
vedaal at hush.com
vedaal at hush.com
Wed Jan 28 21:10:54 CET 2009
if the randomness collected for generation of a gnupg session key,
isn't *absolutely* random, then it may introduce a bias whereby the
session key space can be theoretically be able to be attacked by a
'better-than-brute-force' method, by selectively concentrating on
the possibilities the bias in in favor of
ok
how much of a threat is this really,
given the nature of how gnupg collects random data on the various
computer platforms?
is there any practical way of exploiting this 'less-than-absolute'
randomness, so that the attack is even approaching the threat level
of anything a crypto user needs to be concerned with?
to put it in quantitative terms,
can the 'pseudo-randomness' affect a 256 bit session key,
so that it would effectively be easier to attack than a 'truly-
random' 128 bit key?
if not,
then it shouldn't be a practical concern
is there any test of a computer system that can be done to know
when the level of 'pseudo-randomness' has decreased to where it
should be of practical concern ?
tia,
vedaal
any ads or links below this message are added by hushmail without
my endorsement or awareness of the nature of the link
--
Never be in the dark again. Click now for a new generator!
http://tagline.hushmail.com/fc/PnY6qxsz5e1NtuH5v6j1pZZg64Dd5ytllyp4QuhTXZe4BigcQK8Np/
More information about the Gnupg-users
mailing list