Date:Wed, 13 Sep 2000 01:23:30 +0200 (CEST)
From: Igmar Palsenberg <[EMAIL PROTECTED]>
> No, not true. The mixing into the entropy pool uses a twisted LFSR, but
> all outputs from the pool (to either /dev/random or /dev/urandom)
> filters the output through SHA-1 as a whit
> No, not true. The mixing into the entropy pool uses a twisted LFSR, but
> all outputs from the pool (to either /dev/random or /dev/urandom)
> filters the output through SHA-1 as a whitener. The key here, though,
> and what makes this fundamentally different from yarrow, is that since
> we're f
"Theodore Y. Ts'o" wrote:
>
>Date: Tue, 12 Sep 2000 09:56:12 +
>From: Pravir Chandra <[EMAIL PROTECTED]>
>
>i agree that the yarrow generator does place some faith on the crypto
>cipher and the accumulator uses a hash, but current /dev/random
>places faith on a crc and ur
Date: Tue, 12 Sep 2000 09:56:12 +
From: Pravir Chandra <[EMAIL PROTECTED]>
i agree that the yarrow generator does place some faith on the crypto
cipher and the accumulator uses a hash, but current /dev/random
places faith on a crc and urandom uses a hash.
No, not true. The m
> I'm not a big fan of Yarrow, since it (in my opinion) places too much
> faith in the crypto algorithms. It uses a pathetically small entropy
> pool, and assumes that hash function will do the rest. Which is fine,
> but that makes it a pseudo-RNG, or a crypto-RNG, and not really an
> entropy co
> Why? What's wrong with the current implementation. And more important
> still: How well-known is Yarrow160A? I cannot find it in my copy of
> [Schneier96], so it is probably not older than four years.
much of yarrow-160a has been specified by kelsey himself in discussions with
people at Counter
Date:Mon, 11 Sep 2000 13:08:59 +
From: Pravir Chandra <[EMAIL PROTECTED]>
I've been working to change the implementation of /dev/random over to the
Yarrow-160a algorithm created by Bruce Schneier and John Kelsey. We've been
working on parallel development for Linux and
> In any case, this requires use of a hash function (sha1) and a block
> cipher (3des). We were going to do a replacement of /dev/random
I don't think it does _have_ to be 3des, which is approximately the
slowest and most tedious to implement cipher known to the world. ;-)
Blowfish would be nicer
Pravir Chandra wrote:
>
> I've been working to change the implementation of /dev/random over to the
> Yarrow-160a algorithm created by Bruce Schneier and John Kelsey. We've been
> working on parallel development for Linux and NT so that the algorithms are
> matching. The Yarrow 160A algorithm is
Pravir Chandra wrote:
>
> I've been working to change the implementation of /dev/random over to the
> Yarrow-160a algorithm created by Bruce Schneier and John Kelsey.
For some old discussions on related topics, see:
http://www.openpgp.net/random/
> We've been
> working on parallel development f
I've been working to change the implementation of /dev/random over to the
Yarrow-160a algorithm created by Bruce Schneier and John Kelsey. We've been
working on parallel development for Linux and NT so that the algorithms are
matching. The Yarrow 160A algorithm is a variant of Yarrow-160 that has
11 matches
Mail list logo