On Sat, Dec 15, 2012 at 07:30:20PM -0500, Theodore Ts'o wrote: > > What I would do instead is use an AES-based cryptographic random > number generator. That is, at boot time, grab enough randomness to > for an AES key, and then use that key to create a cryptographic random > number generator by encrypting a counter with said AES key. This is a > cryptographic primitive which has been very carefully studied, and for > architectures where you have a hardware support for AES (including > ARMv8, Power 7, Sparc T4, as well as x86 processors with the AES-NI > instructions), this will be much faster and require much less memory > and CPU resources than replicating the /dev/urandom infrastructure. > I was suggesting in another thread different approach.
Use AES-based cryptographic random number generator as replacement of /dev/urandom. Reseeding would get done by changing both aes key and data. This would with hardware support make /dev/urandom much faster than its now. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/