RE: Cipher question...

2000-06-27 Thread Bill Rebey
, you'll have more reading material than you know what to do with. Bill Rebey -Original Message- From: Douglas Wikström [mailto:[EMAIL PROTECTED]] Sent: Monday, June 26, 2000 5:57 AM To: [EMAIL PROTECTED] Subject:Re: Cipher question... Hello! I know that a larg

Re: Cipher question...

2000-06-26 Thread Douglas Wikström
Hello! I know that a large PKI company uses their own homemade entropy collector to initialize the seed for the keygeneration of their smartcards. The entropy collector requires the admin to move around the mouse for quite a while, so this might not be applicable in a case requiring automation. (

Re: Cipher question...

2000-06-23 Thread Lutz Jaenicke
On Fri, Jun 23, 2000 at 12:41:14PM -0400, Bill Rebey wrote: > This has all been incredibly helpful, and I've been trying to read up on > this matter. I'm finding radioactive isotope counters, FM static samplers, > thermal noise samplers, etc. Lots of cool hardware solutions. I need a > software

RE: Cipher question...

2000-06-23 Thread Bill Rebey
This has all been incredibly helpful, and I've been trying to read up on this matter. I'm finding radioactive isotope counters, FM static samplers, thermal noise samplers, etc. Lots of cool hardware solutions. I need a software solution, though, and they seem quite elusive. The obvious questio

RE: Cipher question...

2000-06-23 Thread Bill Rebey
What gives? -Original Message- From: Gregory Stark [mailto:[EMAIL PROTECTED]] Sent: Thursday, June 22, 2000 2:46 PM To: Bill Rebey Cc: Gregory Stark Subject: Re: Cipher question... Bill, First of all, don't be discouraged; the problem of getting a good seed for a ran

RE: Cipher question...

2000-06-22 Thread Bill Rebey
Sleep(random(2)); QueryPerformanceCounter (&val); seed[c][ii] |= (unsigned )(val.LowPart & 0x01); Sleep(random(2)); } RAND_seed (seed, sizeof (seed)); -Original

RE: Cipher question...

2000-06-22 Thread Bill Rebey
[EMAIL PROTECTED] Subject: RE: Cipher question... > From: Lutz Jaenicke [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, June 20, 2000 1:09 PM > > On Tue, Jun 20, 2000 at 01:51:34PM -0400, Bill Rebey wrote: > > [what's the PRNG seed data used for, and why is it important?] &

RE: Cipher question...

2000-06-21 Thread Michael Wojcik
> From: Lutz Jaenicke [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, June 20, 2000 1:09 PM > > On Tue, Jun 20, 2000 at 01:51:34PM -0400, Bill Rebey wrote: > > [what's the PRNG seed data used for, and why is it important?] > The question is not the amount of data, it is the amount of > "unpredicta

Re: Cipher question...

2000-06-21 Thread Douglas Wikström
/Douglas Bernard Dautrevaux wrote: > > > -Original Message- > > From: Bill Rebey [mailto:[EMAIL PROTECTED]] > > Sent: Tuesday, June 20, 2000 7:52 PM > > To: [EMAIL PROTECTED] > > Subject: RE: Cipher question... > > > > > > &

RE: Cipher question...

2000-06-20 Thread Bernard Dautrevaux
> -Original Message- > From: Bill Rebey [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, June 20, 2000 7:52 PM > To: [EMAIL PROTECTED] > Subject: RE: Cipher question... > > > > Even if all 64 bytes in my seed array are the same, (say for i

Re: Cipher question...

2000-06-20 Thread Lutz Jaenicke
On Tue, Jun 20, 2000 at 01:51:34PM -0400, Bill Rebey wrote: > Thanks for pointing this out. Like I said, I knew the array would probably > contain 64 instances of the same values, but I didn't know it was so > terrible, largely because I don't even understand what the big pool of data > is really

RE: Cipher question...

2000-06-20 Thread Bill Rebey
une 20, 2000 1:30 PM To: [EMAIL PROTECTED] Subject:Re: Cipher question... Bill Rebey wrote: ... an broken snake oil random generator. > Start by running something like this before you do other SSL stuff: > time_t seed[64]; >

Re: Cipher question...

2000-06-20 Thread Goetz Babin-Ebell
Bill Rebey wrote: ... an broken snake oil random generator. > Start by running something like this before you do other SSL stuff: > time_t seed[64]; > for (int ii = 0; ii < 64; ii++) > { > time_t t = time (NULL); >

RE: Cipher question...

2000-06-20 Thread Bill Rebey
Start by running something like this before you do other SSL stuff: time_t seed[64]; for (int ii = 0; ii < 64; ii++) { time_t t = time (NULL); seed[ii] = t; } RAND_seed (