> Hello, > Aparrently the OpenPGP card is based on BasicCard [1] and from the > BasicCard FAQ [2] I read: > "For Enhanced BasicCards, the card has no hardware generator. The Enhanced > BasicCards contain a unique manufacturing number which cannot be read from > outside the card. The Rnd function uses this number to generate random > numbers which are different for each card. > > For Professional and MultiApplication BasicCards, the random number is > generated by use of a hardware random number generator." > > Does anybody know which version of BasicCard is used for the OpenPGP cards > distributed by KernelConcepts.de? If it is the Enhanced version, does the > use of a pseudorandom generator pose a security risk?
In my opinion a (good) PRNG seeded properly under user control is no problem. If -as the FAQ seems to tell- it is primed during production, beyond user control, this implies that normal users have to fully trust the manufacturer. A malicious manufacturer would be able to completely break privacy based on the "Enhanced BasicCard" without the user being able to detect this. An instance is created here, deliberately and unnecessarily, which the user has to trust. This pattern smells like a backdoor mechanism to me. I would outrighly reject to use such a card. Cheers Michael Anders _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users